Ch12: WLAN Security Flashcards

1
Q

Match the authentication and encryption options to the appropriate WLAN security option (Open, WPA Personal, and WPA Enterprise). Options can be used more than once.

A. Pre-shared key (PSK)
B. WPA3: Advanced Encryption Standard (AES)
C. Opportunistic Wireless Encryption: AES
D. WPA2: Advanced Encryption Standard (AES)
E. 802.1X

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F: During the WPA four-way handshake, the Pairwise Master Key (PMK) is used to encrypt data, while the Message Integrity Check (MIC) keys are used for hashing, a frame integrity check.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: Opportunistic Wireless Encryption (OWE) adds encryption to an open SSID that eliminates Man-in-the-Middle (MITM) attacks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: When using WPA2 Personal as your WLAN security option, your security could be subject to offline dictionary attacks. WPA3 Personal mitigates such attacks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: Aruba provides a multi-PSK (mPSK) feature to improve security for devices that lack 802.1X authentication support.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the statement below help you accurately describe digital certificates to your colleagues? (Select three.)

A. Certificates can serve to prove user and device identity, and to provide key management.
B. Only certificates that are properly signed by a Certificate Authority (CA) should be trusted.
C. When creating certificates, you are not required to specify how it should be used, but it is a good idea to do so.
D. Entities must validate all certificates by communicating directly with the root Certificate Authority (CA).

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which options below describe significant features of Aruba Central’s Cloud authentication? (Select all.)

A. It offers a single point of visibility and control over all network infrastructure and related security services.
B. It makes it easy to onboard, monitor, and troubleshoot client connections.
C. It integrates in cloud identity stores like Google Workspace and Azure Active Directory.
D. Artificial intelligence (AI) Insights give you continuous, in-depth visibility into connected client behavior.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly