Core 2: Wireless Security Flashcards
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.
True
False
True
Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
EAP
AES
WPA2
WEP
WEP
Which of the following is the best method to secure a small network lacking an authentication server?
WPA-PSK
WPA2-Enterprise
WPA2-PSK
WPA-Enterprise
WPA2-PSK
What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers)
Suitable for large corporate networks
Does not require an authentication server
Suitable for all types of wireless LANs
Requires RADIUS authentication server
Suitable for large corporate networks
Requires RADIUS authentication server
A security protocol designed to strengthen WEP implementations is known as:
PEAP
TKIP
CCMP
WPA2
TKIP
AES-based encryption mode is a characteristic feature of:
WEP
WPA2
PAP
WPA
WPA2
Which of the following cryptographic algorithms is the least vulnerable to attacks?
AES
DES
RC4
3DES
AES
Which of the following is one of the functions provided by RADIUS and TACACS servers?
Name resolution
Email handling
Authentication
File storage & sharing
Authentication
What are the characteristic features of RADIUS? (Select 3 answers)
Primarily used for network access
Encrypts the entire payload of the access-request packet
Combines authentication and authorization
Encrypts only the password in the access-request packet
Primarily used for device administration
Separates authentication and authorization
Primarily used for network access
Combines authentication and authorization
Encrypts only the password in the access-request packet
What are the characteristics of TACACS+? (Select 3 answers)
Encrypts only the password in the access-request packet
Combines authentication and authorization
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization
Primarily used for network access
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization