Chap 20 - Authenticating Wireless Clients Flashcards

1
Q

How many versions of WPA are there?

A

3 WPA1, WPA2 and WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does WPA stand for, who certifies it, and what 2 things does it specify?

A
  • Wi-Fi Protected Access
  • Certified by Wi-Fi Alliance
  • Specifies data confidentiality and integrity methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many modes of WPA are there?

A
  • WPA Personal (pre-shared key)
  • WPA Enterprise (802.1x)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does WPA Personal authenticate?

A
  • A pre-shared key is configured on every client and AP
  • Clients and APs use the pre-shared key to do a 4-way handshake to construct and exchange encryption key material without sending the PSK over the air
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the downside to using WPA1-Personal or WPA2-Personal

A

Malicious user can eavesdrop and capture the four-way handshake and then use a dictionary attack to guess the pre-shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What has been done differently in WPA3 to avoid the problems with WPA1 and 2?

A
  • Simultaneous Authentication of Equals (SAE) - key exchange strengthened
  • Client and AP can initiate the authentication process equally and even simultaneously
  • Forward Secrecy - even if the PSK is compromised attackers won’t be able to use it to unencrypt data that has already been transmitted over the air
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When configuring WPA2-Personal or WPA3-Personal what should you avoid?

A

Avoid any hybrid mode of WPA like weak WPA with strong AES or strong WPA2 with weak TKIP because these have been deprecated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What 3 parties make up the 802.1x 3 party authentication?

A
  • Supplicant
  • Authenticator (usually the WLC)
  • Authentication Server (usually a RADIUS server)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does EAP stand for, what does it define, and what does it do?

A
  • Extensible Authentication Protocol
  • Defines a set of common functions that actual authentication methods can use
  • Allows enough connectivity with the AP to allow the client to authenticate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In 802.1x what role does the WLC play?

A

Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When configuring the WLC to use 802.1x do you need to select which type of EAP method?

A

No, that is configured on the RADIUS server and must be supported by the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Local EAP?

A

It allows the client EAP access to the EAP Authentication Server built into the WLC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When using Local EAP what 4 versions are supported?

A
  • LEAP
  • PEAP
  • EAP-Fast
  • EAP-TLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is WebAuth?

A

It presents the end user with web page content to read and interact with before granting access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 authentication modes supported by WPA?

A
  • Personal mode using PSK
  • Enterprise mode using 802.1x
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How long does a layer 2 Inter-controller roam take?

A

Less than 20 ms