M5: Protocols and Encryption Flashcards
What is the third iteration of WPA wireless security?
WPA3
What protocol is built on the wpa2 protocol and is intended to replace it?
wpa3
What are the following benefits features of?
*simplified wireless security past wpa2
* stronger authentication past wpa2
*powerful encryption past wpa2
*stable business continuity past wpa2
*enhanced security methods past wpa2
*replacement for legacy protocols past wpa2
*Protected Management Frames (PMF) requirement for enterprise networks
WPA3 Protocol
What are the two versions offered of WPA3?
Personal, enterprise
Which version of WPA3 is intended for individual users and home wifi networks, which addresses common cybersecurity weaknesses that affect consumers’ wireless devices, simplifies wifi security for users?
WPA3-Personal
What feature of WPA3-Personal gives users the ability to set passwords that are easier for the user to remember?
Natural password selection
What feature of WPA3-Personal makes it so users do not need to change the way they connect to wifi to benefit from WPA3’s improved security?
Increased ease of use
What feature of Wpa3-Personal makes it so if a password is stolen, Wpa3 can continue to protect data that is transmitted?
Forward secrecy
What feature of wpa3-personal improves upon the wpa2-personal pre-shared key (psk) handshake protocol?
Simultaneous Authentication of Equals, SAE
What uses PSK to generate a Pairwise Master Key? PMK
SAE, Simultaneous Authentication of Equals
What uses password based authentication and is shared between a wi-fi access point and a wireless device?
PMK, pairwise master key
in SAE, what do the pair use a complex multistage process to prove to one another that they possess?
The PMK, pairwise master key
What does the complex handshake in SAE do?
Makes it hard to intercept packets in order to extract an identifiable authentication key.
What has occurred if the wireless device passes the authentication staging gain access to the secured wifi network in SAE?
The SAE transaction is successful
What reduces the probability of successful dictionary and bruteforce attacks?
SAE authentication.