chapter 20 questions Flashcards

1
Q

An authentication protocol used for secure network access technologies.

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a captive portal?

A

To provide authentication and security for networks in public places such as coffee shops, airports, hotels and stores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A wireless method used to connect certain Wi-Fi devices such as printers and security cameras to the Wi-Fi network without using any passwords.

A

WPS [WiFi Protected Setup]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of site surveys and heat maps.

A

To determine Wi-Fi signal strengths in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A new connection protocol for WPA3 networks that allows users to add devices with limited or no display interface to a network by scanning QR codes.

A

Easy Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses cipher to encrypt the data as it is transmitted through the air.

A

WEP [Wired Equivalent Privacy]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Uses the flawed WEP algorithm with the Temporal Key Integrity Protocol

A

WPA [WiFi Protected Access]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses 802.X to provide authentication and AES as the encryption protocol.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses SAE and a protocol that uses QR codes for easy connect to networks.

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IEEE’s shouldn’t be used today for security reasons?

A

WEP, WPA, and WPA2 due to being outdated with known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Difference between PSK and Enterprise?

A

PSK requires a single password shared between all users, while Enterprise requires unique credentials for each user and is much more secure for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An authentication standard that supports port-based authentication services between a user and an authorization device.

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When multiple Wi-Fi frequencies start to overlap on one another.

A

Channel Overlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is SAE configured?

A

Set the security parameter k to a value of at least 40, per the recommendation in RFC 7664, “Dragonfly Key Exchange”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provides useful information about wireless signals around the person using it.

A

Wi-Fi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is WEP’s flaw?

A

The initialization vector was of insufficient length to protect the channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why are different channels used with the 2.4 and 5 GHz frequencies?

A

To prevent channel overlap which cause wireless speed to slow down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A measure used in science and engineering that compares the level of a desired signal to the level of background noise.

A

Signal-to-Noise ratio

19
Q

What vulnerability does WPA2 possess?

A

It is weak against brute force offline attacks.

20
Q

What version of WPA uses TKIP and RC4?

A

WPA

21
Q

What version of WPA uses CCMP and AES?

A

WPA2

22
Q

What version of WPA uses QR codes for Easy Connect?

A

WPA3

23
Q

What is the purpose of the SSID?

A

To analyze wireless traffic, monitor network activity, identify security vulnerabilities, and troubleshoot networking issues.

24
Q

How does a federated connection work?

A

By connecting a device to multiple trusted networks in the same area.

25
Q

What are the 3 most common channels used on 2.4 GHz and why?

A

1, 6, 11. They are spaced out to prevent channel overlap.

26
Q

What is the relationship between Federation and RADIUS servers?

A

Both connect to trusted networks. RADIUS lets users connect to one network, while Federation lets users connect to multiple trusted networks.

27
Q

A model for establishing a large scale and diverse infrastructure for applications, and authenticate across multiple networks.

A

Federation

28
Q

Introduced MIMO, channel bonding, frame aggregation, up to 4 antennas. Has 2.4 or 5 GHz frequency.

A

WiFi 4

29
Q

Uses MU-MIMO, up to 8 antennas, beam forming. Has 5 GHz frequency.

A

WiFi 5

30
Q

Enchanced MU-MIMO, uses QAM (Quadrature Amplitude Modulation). Has 2.4 or 5 GHz frequency.

A

WiFi 6

31
Q

How many channels are on the 2.4 GHz frequency?

A

11

32
Q

A security protocol that encapsulates the Extensible Authentication Protocol within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

A

PEAP

33
Q

Uses a pre-shared key called Protected Access Credential (PAC) to establish a TLS tunnel in which client credentials are verified.

A

EAP-FAST

34
Q

Uses TLS protocol to secure the authentication process.

A

EAP-TLS

35
Q

Having the server authenticate to the client with a certificate, but the protocol tunnels the client side of the authentication, allowing the use of legacy authentication protocols such as PAP, CHAP, and MS-CHAP. The authentication process is protected by the tunnel from man-in-the-middle attacks.

A

EAP-TTLS

36
Q

Family of digital modulation methods and a related family of analog modulation methods widely used in modern telecommunications to transmit information.

A

Quadrature amplitude modulation (QAM)

37
Q

A block cipher encryption protocol that’s symmetric. It uses the same key to both encrypt and decrypt data.

A

AES

38
Q

A data encapsulation encryption mechanism designed for wireless use.

A

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

39
Q

An organization that promotes the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.

A

IEEE (Institute of Electrical and Electronics Engineers)

40
Q

Credentials that are distributed to clients for optimized network authentication. Can be used to establish an authentication tunnel between client and server.

A

PAC (Protected Access Credentials)

41
Q

A password based key exchange method developed for mesh networks.

A

SAE (Simultaneous Authentication of Equals)

42
Q

A unique identifier assigned to a WiFi network that allows devices on the network to identify and connect to the correct network.

A

SSID (Service Set Identifier)

43
Q

What points should you consider when determining WAP placement in a business environment?

A

Somewhere in the center of the area or in a place where the signal can reach all parts of the building equally.