chapter 4 part 2 Flashcards

1
Q

what is 802.1x?

A

Port-Based Access Control:
Ethernet security- if a device connects to a port on a switch then the switch is the Gateway and communicates with a server to figure out if the user is legit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Central authentication server?

A

a server on the LAN that works with the switch gateway ports and associated devices connected- this server asks for passwords for each device (supplicant) before allowing said device to communicate on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the benefit of using a Server (Radius) instead of using a switch as a gateway and authentication on a network?

A

reduces cost b/c each switch on the network would need to have high processing power and need to be configured with authentication information.

  • consistency b/c one database is checked for any connection and this reduces security issues b/c if many databases then one could be mis-configured.
  • Immediate changes since just one database is used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EAP?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the EAP operation?

A

EAP - Extensible Authentication Protocol:
step 1: EAP start sent to server from switch,
2: server sends EAP request to client (smart card),
3: client responds negative to smart card,
4: EAP Request with MS-CHAP from server to device
5: Supplicant (Device) responds with MS-CHAP response string.
6: Server sends back success EAP to device but goes to switch (Gateway) first and the switch decides how to authenticate the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

pass-through operation?

A

when a switch on a LAN passes EAP: Extensible Authentication Protocol information from a server to a supplicant (device on LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensibility?

A

EAP Extensible Authentication Protocol: is Extensible b/c it is able to add new protocols without changing the overall structure of the EAP and no updates are needed to old EAP 802.1x switches. saves $

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Radius?

A

a client/ server Protocol used by 802.1x Authentication servers. Also: authenticated users, restricts access and what specific users can/ can not do to files. *works with EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

if a network is OPEN or if a network if not encrypted/ does not use security/// are both types for anyone to access?

A

if a network is marked as open then yes anyone can get on it, but if a network does not have security on it then no, only users that have permission can access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RFMON?

A

Radio Frequency Monitoring: a chipset on a client must have this ability if they want to use a sniffer program on wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pomiscuous mode?

A

a wireless card that is set up in this mode allows an attacker to receive packets that are intended for other wireless users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

whaling>?

A

focusing attacks on high value targets like CEO’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evil twin access point?

A

a computer that has software on it so it can act like a wireless access point and do a man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how can a DOS attack work on a wireless network?

A

use CTS/RTS frames. these frames tell the other wireless clients to wait while a message is being transmitted. this causes denial of service to other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how does 802.11i work and what is it?

A

same as 802.1x but over wifi:
*uses a digital certificate between the client and the AP (Outer authentication)- access Point. this is an additional layer of security since wireless signals can be intercepted. then the frames use the EAP to communicate with the Radius server. (inner Authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is EAP-TLS?

A

EAP-TLS: supplicant needs a digital certificate- expensive.

  • PEAP: Protective EAP: any lvl of authentication can be selected.
  • *both used as extended EAP for wireless EAP or 802.11i