Domain 2.0 security Flashcards
Conceptualization and retention
Question 17:
What encryption type was used by WPA to better secure wireless networks than WEP?
Correct Answer: TKIP
WPA (Wi-Fi Protected Access) uses RC4 with TKIP (Temporal Key Integrity Protocol) to address vulnerabilities in WEP (Wired Equivalent Privacy). TKIP dynamically changes keys to secure communication.
How to prevent unauthorized devices (like Bob’s Laptop) from connecting to your wireless network?
Disable WPS
WPS (Wi-Fi Protected Setup) simplifies device connection but is vulnerable to brute-force attacks. Disabling WPS prevents unauthorized devices from connecting even if they know your WPS PIN.
Question 27:
Which encryption uses a 128-bit key but is weak due to a 24-bit initialization vector?
WEP
Explanation:
WEP uses a 24-bit initialization vector (IV) for key security, but this makes it susceptible to attacks. WPA and WPA2 replaced WEP with more secure encryption methods like TKIP and AES.
Question 50:
Which policy dictates password complexity requirements for a wireless network?
Password Policy
Explanation:
A password policy defines rules like minimum length, complexity, and periodic changes to ensure secure access.
Question 58:
What security control helps administrators deploy configuration settings across devices?
Correct Answer: GPO
Explanation:
Group Policy Object (GPO) in Windows allows centralized control of device configurations, ensuring consistency and security for users and systems
What cryptographic attack uses a list of passwords to unlock a file?
Correct Answer: Dictionary Attack
Explanation:
A dictionary attack tries common passwords from a predefined list, unlike brute-force attacks, which try every possible combination.