chapter 20 questions Flashcards
An authentication protocol used for secure network access technologies.
EAP
What is the purpose of a captive portal?
To provide authentication and security for networks in public places such as coffee shops, airports, hotels and stores.
A wireless method used to connect certain Wi-Fi devices such as printers and security cameras to the Wi-Fi network without using any passwords.
WPS [WiFi Protected Setup]
What is the purpose of site surveys and heat maps.
To determine Wi-Fi signal strengths in a network.
A new connection protocol for WPA3 networks that allows users to add devices with limited or no display interface to a network by scanning QR codes.
Easy Connect
Uses cipher to encrypt the data as it is transmitted through the air.
WEP [Wired Equivalent Privacy]
Uses the flawed WEP algorithm with the Temporal Key Integrity Protocol
WPA [WiFi Protected Access]
Uses 802.X to provide authentication and AES as the encryption protocol.
WPA2
uses SAE and a protocol that uses QR codes for easy connect to networks.
WPA3
Which IEEE’s shouldn’t be used today for security reasons?
WEP, WPA, and WPA2 due to being outdated with known vulnerabilities.
Difference between PSK and Enterprise?
PSK requires a single password shared between all users, while Enterprise requires unique credentials for each user and is much more secure for it.
An authentication standard that supports port-based authentication services between a user and an authorization device.
IEEE 802.1x
When multiple Wi-Fi frequencies start to overlap on one another.
Channel Overlay
How is SAE configured?
Set the security parameter k to a value of at least 40, per the recommendation in RFC 7664, “Dragonfly Key Exchange”.
Provides useful information about wireless signals around the person using it.
Wi-Fi analyzer
What is WEP’s flaw?
The initialization vector was of insufficient length to protect the channel.
Why are different channels used with the 2.4 and 5 GHz frequencies?
To prevent channel overlap which cause wireless speed to slow down.
A measure used in science and engineering that compares the level of a desired signal to the level of background noise.
Signal-to-Noise ratio
What vulnerability does WPA2 possess?
It is weak against brute force offline attacks.
What version of WPA uses TKIP and RC4?
WPA
What version of WPA uses CCMP and AES?
WPA2
What version of WPA uses QR codes for Easy Connect?
WPA3
What is the purpose of the SSID?
To analyze wireless traffic, monitor network activity, identify security vulnerabilities, and troubleshoot networking issues.
How does a federated connection work?
By connecting a device to multiple trusted networks in the same area.
What are the 3 most common channels used on 2.4 GHz and why?
1, 6, 11. They are spaced out to prevent channel overlap.
What is the relationship between Federation and RADIUS servers?
Both connect to trusted networks. RADIUS lets users connect to one network, while Federation lets users connect to multiple trusted networks.
A model for establishing a large scale and diverse infrastructure for applications, and authenticate across multiple networks.
Federation
Introduced MIMO, channel bonding, frame aggregation, up to 4 antennas. Has 2.4 or 5 GHz frequency.
WiFi 4
Uses MU-MIMO, up to 8 antennas, beam forming. Has 5 GHz frequency.
WiFi 5
Enchanced MU-MIMO, uses QAM (Quadrature Amplitude Modulation). Has 2.4 or 5 GHz frequency.
WiFi 6
How many channels are on the 2.4 GHz frequency?
11
A security protocol that encapsulates the Extensible Authentication Protocol within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
PEAP
Uses a pre-shared key called Protected Access Credential (PAC) to establish a TLS tunnel in which client credentials are verified.
EAP-FAST
Uses TLS protocol to secure the authentication process.
EAP-TLS
Having the server authenticate to the client with a certificate, but the protocol tunnels the client side of the authentication, allowing the use of legacy authentication protocols such as PAP, CHAP, and MS-CHAP. The authentication process is protected by the tunnel from man-in-the-middle attacks.
EAP-TTLS
Family of digital modulation methods and a related family of analog modulation methods widely used in modern telecommunications to transmit information.
Quadrature amplitude modulation (QAM)
A block cipher encryption protocol that’s symmetric. It uses the same key to both encrypt and decrypt data.
AES
A data encapsulation encryption mechanism designed for wireless use.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
An organization that promotes the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
IEEE (Institute of Electrical and Electronics Engineers)
Credentials that are distributed to clients for optimized network authentication. Can be used to establish an authentication tunnel between client and server.
PAC (Protected Access Credentials)
A password based key exchange method developed for mesh networks.
SAE (Simultaneous Authentication of Equals)
A unique identifier assigned to a WiFi network that allows devices on the network to identify and connect to the correct network.
SSID (Service Set Identifier)
What points should you consider when determining WAP placement in a business environment?
Somewhere in the center of the area or in a place where the signal can reach all parts of the building equally.