Exam Compass - Wireless Security Quiz Flashcards

1
Q

Which wireless encryption scheme offers the highest level of protection?
WEP
WPA3
WPS
WPA
WPA2

A

WPA3 = Wi fi protected access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a security protocol designed to strengthen WEP implementations?
PEAP
TKIP
CCMP
WPA2

A

TKIP = Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following wireless technologies has been deprecated and should not be used due to its known vulnerabilities?
EAP
WPA2
AES
WEP

A

WEP= Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES
DES
RC4
3DES

A

AES = Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?
RC4
AES-CCMP
TKIP with RC4
AES-GCMP

A

AES-CCMP = Cipher Block Chaining Message Authentication Code Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of: (Select 2 answers)
AES-GCMP
PSK
TKIP with RC4
RC4
AES-CCMP
SAE

A

AES-GCMP = Galois Counter Mode Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode?
AES
RC4
IKE
PSK
SAE

A

PSK = pre-shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the acronyms listed below refers to a client authentication method used in WPA3 Personal mode?
SAE
IKE
RC4
PSK
AES

A

SAE =
Simultaneous Authentication of Equals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following would be the best solution for securing a small network that lacks an authentication server?
WPA3-SAE
WPA2-Enterprise
WPA2-PSK
WPA3-Enterprise

A

WPA3-SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristic features of WPA2/WPA3 Enterprise mode? (Select 3 answers)
Suitable for large corporate networks
IEEE 802.1D
Does not require an authentication server
IEEE 802.1X
Suitable for all types of wireless LANs
Requires RADIUS authentication server

A

Suitable for large corporate networks

IEEE 802.1X

Requires RADIUS authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
Authorization
Accounting

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to the process of granting or denying access to resources?
Authentication
Authorization
Accounting

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of more complex authentication protocols providing the AAA functionality include: (Select all that apply)
CHAP
TACACS+
PAP
RADIUS
MS-CHAP

A

TACACS+
RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of TACACS+? (Select 3 answers)
Encrypts only the password in the access-request packet
Combines authentication and authorization
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization
Primarily used for network access

A

Encrypts the entire payload of the access-request packet

Primarily used for device administration

Separates authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristic features of RADIUS? (Select 3 answers)
Primarily used for network access
Encrypts the entire payload of the access-request packet
Combines authentication and authorization
Encrypts only the password in the access-request packet
Primarily used for device administration
Separates authentication and authorization

A

Primarily used for network access

Combines authentication and authorization

Encrypts only the password in the access-request packet

17
Q

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?
PAP
LDAP
MS-CHAP
Kerberos

A

Kerberos

18
Q

Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of:
SAML
TOTP
RADIUS
Kerberos

A

Kerberos

19
Q

In the Kerberos-based authentication process, the purpose of the client’s timestamp is to provide a countermeasure against:
Replay attacks
Dictionary attacks
Birthday attacks
Downgrade attacks

A

Replay attacks