Core 2: Wireless Security Flashcards

1
Q

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

EAP
AES
WPA2
WEP

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the best method to secure a small network lacking an authentication server?

WPA-PSK
WPA2-Enterprise
WPA2-PSK
WPA-Enterprise

A

WPA2-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers)

Suitable for large corporate networks
Does not require an authentication server
Suitable for all types of wireless LANs
Requires RADIUS authentication server

A

Suitable for large corporate networks

Requires RADIUS authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security protocol designed to strengthen WEP implementations is known as:

PEAP
TKIP
CCMP
WPA2

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES-based encryption mode is a characteristic feature of:

WEP
WPA2
PAP
WPA

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following cryptographic algorithms is the least vulnerable to attacks?

AES
DES
RC4
3DES

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is one of the functions provided by RADIUS and TACACS servers?

Name resolution
Email handling
Authentication
File storage & sharing

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristic features of RADIUS? (Select 3 answers)

Primarily used for network access
Encrypts the entire payload of the access-request packet
Combines authentication and authorization
Encrypts only the password in the access-request packet
Primarily used for device administration
Separates authentication and authorization

A

Primarily used for network access

Combines authentication and authorization

Encrypts only the password in the access-request packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of TACACS+? (Select 3 answers)

Encrypts only the password in the access-request packet

Combines authentication and authorization

Encrypts the entire payload of the access-request packet

Primarily used for device administration

Separates authentication and authorization

Primarily used for network access

A

Encrypts the entire payload of the access-request packet

Primarily used for device administration

Separates authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly