Exam Compass - Wireless Security Quiz Flashcards
Which wireless encryption scheme offers the highest level of protection?
WEP
WPA3
WPS
WPA
WPA2
WPA3 = Wi fi protected access
Which of the answers listed below refers to a security protocol designed to strengthen WEP implementations?
PEAP
TKIP
CCMP
WPA2
TKIP = Temporal Key Integrity Protocol
Which of the following wireless technologies has been deprecated and should not be used due to its known vulnerabilities?
EAP
WPA2
AES
WEP
WEP= Wired Equivalent Privacy
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES
DES
RC4
3DES
AES = Advanced Encryption Standard
Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?
RC4
AES-CCMP
TKIP with RC4
AES-GCMP
AES-CCMP = Cipher Block Chaining Message Authentication Code Protocol
For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of: (Select 2 answers)
AES-GCMP
PSK
TKIP with RC4
RC4
AES-CCMP
SAE
AES-GCMP = Galois Counter Mode Protocol
Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode?
AES
RC4
IKE
PSK
SAE
PSK = pre-shared key
Which of the acronyms listed below refers to a client authentication method used in WPA3 Personal mode?
SAE
IKE
RC4
PSK
AES
SAE =
Simultaneous Authentication of Equals
Which of the following would be the best solution for securing a small network that lacks an authentication server?
WPA3-SAE
WPA2-Enterprise
WPA2-PSK
WPA3-Enterprise
WPA3-SAE
What are the characteristic features of WPA2/WPA3 Enterprise mode? (Select 3 answers)
Suitable for large corporate networks
IEEE 802.1D
Does not require an authentication server
IEEE 802.1X
Suitable for all types of wireless LANs
Requires RADIUS authentication server
Suitable for large corporate networks
IEEE 802.1X
Requires RADIUS authentication server
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
Authorization
Accounting
Authentication
Which of the answers listed below refers to the process of granting or denying access to resources?
Authentication
Authorization
Accounting
Authorization
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting
Accounting
Examples of more complex authentication protocols providing the AAA functionality include: (Select all that apply)
CHAP
TACACS+
PAP
RADIUS
MS-CHAP
TACACS+
RADIUS
What are the characteristics of TACACS+? (Select 3 answers)
Encrypts only the password in the access-request packet
Combines authentication and authorization
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization
Primarily used for network access
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization