NAC Flashcards
Why should you avoid using Open Authentication by itself in an enterprise wireless deployment?
With Open Authentication, no authentication is performed by the wireless client before associating with an AP.
What are the two authentication modes available to you when using a version of WPA?
Pre-Shared Key (Personal mode) and 802.1X (Enterprise mode)
Where is the supplicant located when using 802.1X to authenticate wireless clients?
On the wireless access client
With WebAuth, which type of Layer 3 security authenticates wireless users against a local database?
Local web authentication with an internal database
What wireless authentication method uses the more secure Advanced Encryption Standard (AES) and pre-shared key for authentication?
WPA2 Personal
What wireless authentication method utilizes user-level authentication along with 802.1X standards with AES encryption?
WPA2 Enterprise
What wireless authentication method uses simultaneous authentication of equals (SAE) to build on WPA2 PSK to allow users to authenticate with a passphrase only?
WPA3 Personal
What wireless authentication method provides protection for a network transmitting sensitive data by offering 192-bit cryptographic strength? This is considered the most secure wireless authentication method.
WPA3 Enterprise
Which 802.1X component is the client device that is requesting access to the network?
Supplicant
Which 802.1X component is the network device that is providing access to the network?
Authenticator
Which 802.1X component is the device that accepts the user or client credentials and denies or permits access to the network based on policies and a user database?
Authentication server
With wireless client authentication, what two devices share the PSK?
WLC and AP
Wireless client and WLC
Wireless client and AP
WLC and RADIUS server
Wireless client and AP
Which of the following wireless authentication methods is considered the most secure?
WPA2 Personal
WPA2 Enterprise
WPA3 Personal
WPA3 Enterprise
WPA3 Enterprise
True or false: When using WebAuth, passthrough mode does not require wireless users to enter credentials on a web page.
True
Which wireless authentication method can you use with Open Authentication to present an acceptable use policy acknowledgment?
PSK
WebAuth
EAP
RADIUS
WebAuth