NAC Flashcards
Why should you avoid using Open Authentication by itself in an enterprise wireless deployment?
With Open Authentication, no authentication is performed by the wireless client before associating with an AP.
What are the two authentication modes available to you when using a version of WPA?
Pre-Shared Key (Personal mode) and 802.1X (Enterprise mode)
Where is the supplicant located when using 802.1X to authenticate wireless clients?
On the wireless access client
With WebAuth, which type of Layer 3 security authenticates wireless users against a local database?
Local web authentication with an internal database
What wireless authentication method uses the more secure Advanced Encryption Standard (AES) and pre-shared key for authentication?
WPA2 Personal
What wireless authentication method utilizes user-level authentication along with 802.1X standards with AES encryption?
WPA2 Enterprise
What wireless authentication method uses simultaneous authentication of equals (SAE) to build on WPA2 PSK to allow users to authenticate with a passphrase only?
WPA3 Personal
What wireless authentication method provides protection for a network transmitting sensitive data by offering 192-bit cryptographic strength? This is considered the most secure wireless authentication method.
WPA3 Enterprise
Which 802.1X component is the client device that is requesting access to the network?
Supplicant
Which 802.1X component is the network device that is providing access to the network?
Authenticator
Which 802.1X component is the device that accepts the user or client credentials and denies or permits access to the network based on policies and a user database?
Authentication server
With wireless client authentication, what two devices share the PSK?
WLC and AP
Wireless client and WLC
Wireless client and AP
WLC and RADIUS server
Wireless client and AP
Which of the following wireless authentication methods is considered the most secure?
WPA2 Personal
WPA2 Enterprise
WPA3 Personal
WPA3 Enterprise
WPA3 Enterprise
True or false: When using WebAuth, passthrough mode does not require wireless users to enter credentials on a web page.
True
Which wireless authentication method can you use with Open Authentication to present an acceptable use policy acknowledgment?
PSK
WebAuth
EAP
RADIUS
WebAuth
Which of the following wireless authentication methods does WPA3 Personal support?
Open Authentication
PSK
EAP
WebAuth
PSK
Which wireless authentication method is required if you want to integrate wireless client authentication with 802.1X?
Open Authentication
PSK
EAP
WebAuth
EAP
Which of the following EAP authenication protocols requires both a client and a server digital certificate?
PEAP
EAP-TLS
LEAP
EAP-FAST
EAP-TLS
Which of the following EAP authenication protocols only requires the server to have a digital certificate and clients can have a one-time password?
PEAP
EAP-TLS
LEAP
EAP-FAST
PEAP
Which EAP authentication protocol is very secure, and requires client certificates to be installed on each Wi-Fi workstation? This approach requires a PKI infrastructure with extra administrative expertise.
PEAP
EAP-TLS
LEAP
EAP-FAST
EAP-TLS
Which EAP authentication protocol is secure and requires only server-side certificates? Use of a PKI is optional. Cisco and Microsoft both support this type.
PEAP
EAP-TLS
LEAP
EAP-FAST
PEAP
Which EAP authentication protocol is a secure solution for enterprises that cannot enforce a strong password policy and do not want to deploy certificates for authentication?
PEAP
EAP-TLS
LEAP
EAP-FAST
EAP-FAST
Which EAP authentication protocol addresses the certificate issue by tunneling TLS, and thus eliminating the need for a certificate on the client side? This type is a proprietary standard, and there is a charge for supplicant and authentication server software.
PEAP
EAP-TLS
EAP-TTLS
EAP-FAST
EAP-TTLS
Which EAP authentication protocol was previously a Cisco proprietary type, but now licensed to other vendors? A strong password policy should be enforced when used for authentication to prevent dictionary attacks. Not recommended for enterprise deployments.
LEAP
What do Linux clients require to successfully implement Cisco IBNS?
installation of a Cisco 80x.1X supplicant
configuration of a native operating system authenticator
installation of an open-source supplicant
installation of an open-source authenticator
installation of an open-source supplicant
What is a characteristic of a 802.1X single-host mode?
second client causes unauthorized port state
one device (first MAC address) authenticated
all subsequent devices get access based on first device authentication
multiple hosts can be attached to a single 802.1X-enabled port
Second client causes unauthorized port state. In single-host mode, only one client can be connected to the 802.1X-enabled port.