M5: Protocols and Encryption Flashcards

1
Q

What is the third iteration of WPA wireless security?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol is built on the wpa2 protocol and is intended to replace it?

A

wpa3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the following benefits features of?
*simplified wireless security past wpa2
* stronger authentication past wpa2
*powerful encryption past wpa2
*stable business continuity past wpa2
*enhanced security methods past wpa2
*replacement for legacy protocols past wpa2
*Protected Management Frames (PMF) requirement for enterprise networks

A

WPA3 Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two versions offered of WPA3?

A

Personal, enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which version of WPA3 is intended for individual users and home wifi networks, which addresses common cybersecurity weaknesses that affect consumers’ wireless devices, simplifies wifi security for users?

A

WPA3-Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What feature of WPA3-Personal gives users the ability to set passwords that are easier for the user to remember?

A

Natural password selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What feature of WPA3-Personal makes it so users do not need to change the way they connect to wifi to benefit from WPA3’s improved security?

A

Increased ease of use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What feature of Wpa3-Personal makes it so if a password is stolen, Wpa3 can continue to protect data that is transmitted?

A

Forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What feature of wpa3-personal improves upon the wpa2-personal pre-shared key (psk) handshake protocol?

A

Simultaneous Authentication of Equals, SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What uses PSK to generate a Pairwise Master Key? PMK

A

SAE, Simultaneous Authentication of Equals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What uses password based authentication and is shared between a wi-fi access point and a wireless device?

A

PMK, pairwise master key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in SAE, what do the pair use a complex multistage process to prove to one another that they possess?

A

The PMK, pairwise master key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the complex handshake in SAE do?

A

Makes it hard to intercept packets in order to extract an identifiable authentication key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What has occurred if the wireless device passes the authentication staging gain access to the secured wifi network in SAE?

A

The SAE transaction is successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What reduces the probability of successful dictionary and bruteforce attacks?

A

SAE authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cyber attacks include cracking short, weak, and commonly used passwords?

A

dictionary, brute force

17
Q

What feature corrects a weakness exploited by cybercriminals who could perform key reinstallation attacks (KRACKs) when in close proximity to a wifi user?

A

SAE, simultaneous authentication of equals

18
Q

What type of attack can decrypt data and expose passwords, credit card information, photos, chats, emails, and more, which simultaneous authentication of equals protects against.

A

KRACKs, key reinstallation attacks

19
Q

what version of wpa3 is intended for business networks with multiple users

A

wpa3-Enterprise

20
Q

what protocol addresses the wpa2-Enterprise weaknesses that cybercriminals have been able to exploit?

A

Wpa3-Enterprise

21
Q

What does AES stand for?

A

Advanced encryption standard

22
Q

What standard uses GCMP-256-bit encryption?

A

AES Galois/Counter Mode Protocol GCMP-256

23
Q

What standard replaces the wpa2 128-bit AES-Counter Mode Protocol (CCMP), Cipher Block chaining message authentication code (cbc-mac)?

A

AES with GCMP-256-bit encryption

24
Q

What strong security protocol makes it harder for cybercriminals to perform Meddler-in-the-MIddle attacks?

A

GCMP-256-bit encryption

25
Q

What Encryption standard Improves upon the wpa2 wireless Encryption standard of 802.1x Open Authentication and Extensible Authentication Protocol (EAP)?

A

opportunistic wireless encryption, OWE

26
Q

At what WPA protocol does EAP require additional support to help it encrypt and authenticate logging credentials?

A

Wpa2

27
Q

in what wpa protocol does OWE replace EAP with a solution that encrypts and authenticates all wireless traffic?

A

WPA3

28
Q

What wpa protocol replaces wifi passwords by assigning a unique key to each device that has permission to access the network? Repairing the experience wifi users have in open, public networks. Restaurants, coffee shop, mall, etc

A

WPA3 OWE

29
Q

How does WPA3 improve upon the wpa2 wifi protected setup (wps) encryption technology between wireless devices and routers?

A

WPA wifi Device Provisioning Protocol (DPP)

30
Q

What WPA protocol uses QR codes or NFC tags to grant passwordless wifi access to wireless devices?

A

DPP

31
Q

What WPA3 protocol creates Hash code from a secret key, which is sent with each message passed between a wifi access point and user’s device.

A

384-bit Hashed message Authentication Mode (HMAC) with Secure Hash Algorithm (SHA)

32
Q

in HMAC with SHA, what is compared to make sure they match?

A

The hash code from the origin of the message and the hash code from the receiver of the message

33
Q

in HMAC with SHA, what does a discrepance between two hashes indicate?

A

the message was compromised or corrupted.

34
Q

In WPA3, what is a key managment and authentication feature that is used for faster performance, and is supported by most browsers, replacing WPA2 4-way handshake?

A

Elliptic Curve Diffie-Hellman exchange (ECDHE) and elliptic curve digital signature algorithm (ECDSA)

35
Q

what will the tach industry need to do forever in order to stay ahead of evolving tools used by cybercriminals?

A

develop more complex encryption algorithms.

36
Q

New features including:
natural password selection
increased ease of use
forward secrecy
simultaneous authentication of equals
are features of what version of WPA?

A

WPA3-Personal

37
Q

Features including:
Galois/Counter Mode Protocol (GCMP-256)

Opportunistic Wireless Encryption (OWE)

Wi-Fi Device Provisioning Protocol (DPP)

384-bit Hashed Message Authentication Mode (HMAC) with Secure Hash Algorithm (SHA)

Elliptic Curve Diffie-Hellman Exchange (ECDHE) and Elliptic Curve Digital Signature Algorithm (ECDSA)
Are examples of which WPA?

A

WPA3-Enterprise

38
Q
A