chapter 20 questions Flashcards

1
Q

An authentication protocol used for secure network access technologies.

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a captive portal?

A

To provide authentication and security for networks in public places such as coffee shops, airports, hotels and stores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A wireless method used to connect certain Wi-Fi devices such as printers and security cameras to the Wi-Fi network without using any passwords.

A

WPS [WiFi Protected Setup]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of site surveys and heat maps.

A

To determine Wi-Fi signal strengths in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A new connection protocol for WPA3 networks that allows users to add devices with limited or no display interface to a network by scanning QR codes.

A

Easy Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses cipher to encrypt the data as it is transmitted through the air.

A

WEP [Wired Equivalent Privacy]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Uses the flawed WEP algorithm with the Temporal Key Integrity Protocol

A

WPA [WiFi Protected Access]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses 802.X to provide authentication and AES as the encryption protocol.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses SAE and a protocol that uses QR codes for easy connect to networks.

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IEEE’s shouldn’t be used today for security reasons?

A

WEP, WPA, and WPA2 due to being outdated with known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Difference between PSK and Enterprise?

A

PSK requires a single password shared between all users, while Enterprise requires unique credentials for each user and is much more secure for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An authentication standard that supports port-based authentication services between a user and an authorization device.

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When multiple Wi-Fi frequencies start to overlap on one another.

A

Channel Overlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is SAE configured?

A

Set the security parameter k to a value of at least 40, per the recommendation in RFC 7664, “Dragonfly Key Exchange”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provides useful information about wireless signals around the person using it.

A

Wi-Fi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is WEP’s flaw?

A

The initialization vector was of insufficient length to protect the channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why are different channels used with the 2.4 and 5 GHz frequencies?

A

To prevent channel overlap which cause wireless speed to slow down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A measure used in science and engineering that compares the level of a desired signal to the level of background noise.

A

Signal-to-Noise ratio

19
Q

What vulnerability does WPA2 possess?

A

It is weak against brute force offline attacks.

20
Q

What version of WPA uses TKIP and RC4?

21
Q

What version of WPA uses CCMP and AES?

22
Q

What version of WPA uses QR codes for Easy Connect?

23
Q

What is the purpose of the SSID?

A

To analyze wireless traffic, monitor network activity, identify security vulnerabilities, and troubleshoot networking issues.

24
Q

How does a federated connection work?

A

By connecting a device to multiple trusted networks in the same area.

25
What are the 3 most common channels used on 2.4 GHz and why?
1, 6, 11. They are spaced out to prevent channel overlap.
26
What is the relationship between Federation and RADIUS servers?
Both connect to trusted networks. RADIUS lets users connect to one network, while Federation lets users connect to multiple trusted networks.
27
A model for establishing a large scale and diverse infrastructure for applications, and authenticate across multiple networks.
Federation
28
Introduced MIMO, channel bonding, frame aggregation, up to 4 antennas. Has 2.4 or 5 GHz frequency.
WiFi 4
29
Uses MU-MIMO, up to 8 antennas, beam forming. Has 5 GHz frequency.
WiFi 5
30
Enchanced MU-MIMO, uses QAM (Quadrature Amplitude Modulation). Has 2.4 or 5 GHz frequency.
WiFi 6
31
How many channels are on the 2.4 GHz frequency?
11
32
A security protocol that encapsulates the Extensible Authentication Protocol within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
PEAP
33
Uses a pre-shared key called Protected Access Credential (PAC) to establish a TLS tunnel in which client credentials are verified.
EAP-FAST
34
Uses TLS protocol to secure the authentication process.
EAP-TLS
35
Having the server authenticate to the client with a certificate, but the protocol tunnels the client side of the authentication, allowing the use of legacy authentication protocols such as PAP, CHAP, and MS-CHAP. The authentication process is protected by the tunnel from man-in-the-middle attacks.
EAP-TTLS
36
Family of digital modulation methods and a related family of analog modulation methods widely used in modern telecommunications to transmit information.
Quadrature amplitude modulation (QAM)
37
A block cipher encryption protocol that's symmetric. It uses the same key to both encrypt and decrypt data.
AES
38
A data encapsulation encryption mechanism designed for wireless use.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
39
An organization that promotes the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
IEEE (Institute of Electrical and Electronics Engineers)
40
Credentials that are distributed to clients for optimized network authentication. Can be used to establish an authentication tunnel between client and server.
PAC (Protected Access Credentials)
41
A password based key exchange method developed for mesh networks.
SAE (Simultaneous Authentication of Equals)
42
A unique identifier assigned to a WiFi network that allows devices on the network to identify and connect to the correct network.
SSID (Service Set Identifier)
43
What points should you consider when determining WAP placement in a business environment?
Somewhere in the center of the area or in a place where the signal can reach all parts of the building equally.