NAC Flashcards

1
Q

Why should you avoid using Open Authentication by itself in an enterprise wireless deployment?

A

With Open Authentication, no authentication is performed by the wireless client before associating with an AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two authentication modes available to you when using a version of WPA?

A

Pre-Shared Key (Personal mode) and 802.1X (Enterprise mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where is the supplicant located when using 802.1X to authenticate wireless clients?

A

On the wireless access client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With WebAuth, which type of Layer 3 security authenticates wireless users against a local database?

A

Local web authentication with an internal database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What wireless authentication method uses the more secure Advanced Encryption Standard (AES) and pre-shared key for authentication?

A

WPA2 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What wireless authentication method utilizes user-level authentication along with 802.1X standards with AES encryption?

A

WPA2 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What wireless authentication method uses simultaneous authentication of equals (SAE) to build on WPA2 PSK to allow users to authenticate with a passphrase only?

A

WPA3 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What wireless authentication method provides protection for a network transmitting sensitive data by offering 192-bit cryptographic strength? This is considered the most secure wireless authentication method.

A

WPA3 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which 802.1X component is the client device that is requesting access to the network?

A

Supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which 802.1X component is the network device that is providing access to the network?

A

Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which 802.1X component is the device that accepts the user or client credentials and denies or permits access to the network based on policies and a user database?

A

Authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

With wireless client authentication, what two devices share the PSK?

WLC and AP

Wireless client and WLC

Wireless client and AP

WLC and RADIUS server

A

Wireless client and AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following wireless authentication methods is considered the most secure?

WPA2 Personal

WPA2 Enterprise

WPA3 Personal

WPA3 Enterprise

A

WPA3 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: When using WebAuth, passthrough mode does not require wireless users to enter credentials on a web page.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which wireless authentication method can you use with Open Authentication to present an acceptable use policy acknowledgment?

PSK

WebAuth

EAP

RADIUS

A

WebAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following wireless authentication methods does WPA3 Personal support?

Open Authentication

PSK

EAP

WebAuth

A

PSK

17
Q

Which wireless authentication method is required if you want to integrate wireless client authentication with 802.1X?

Open Authentication

PSK

EAP

WebAuth

A

EAP

18
Q

Which of the following EAP authenication protocols requires both a client and a server digital certificate?

PEAP

EAP-TLS

LEAP

EAP-FAST

A

EAP-TLS

19
Q

Which of the following EAP authenication protocols only requires the server to have a digital certificate and clients can have a one-time password?

PEAP

EAP-TLS

LEAP

EAP-FAST

A

PEAP

20
Q

Which EAP authentication protocol is very secure, and requires client certificates to be installed on each Wi-Fi workstation? This approach requires a PKI infrastructure with extra administrative expertise.

PEAP

EAP-TLS

LEAP

EAP-FAST

A

EAP-TLS

21
Q

Which EAP authentication protocol is secure and requires only server-side certificates? Use of a PKI is optional. Cisco and Microsoft both support this type.

PEAP

EAP-TLS

LEAP

EAP-FAST

A

PEAP

22
Q

Which EAP authentication protocol is a secure solution for enterprises that cannot enforce a strong password policy and do not want to deploy certificates for authentication?

PEAP

EAP-TLS

LEAP

EAP-FAST

A

EAP-FAST

23
Q

Which EAP authentication protocol addresses the certificate issue by tunneling TLS, and thus eliminating the need for a certificate on the client side? This type is a proprietary standard, and there is a charge for supplicant and authentication server software.

PEAP

EAP-TLS

EAP-TTLS

EAP-FAST

A

EAP-TTLS

24
Q

Which EAP authentication protocol was previously a Cisco proprietary type, but now licensed to other vendors? A strong password policy should be enforced when used for authentication to prevent dictionary attacks. Not recommended for enterprise deployments.

A

LEAP

25
Q

What do Linux clients require to successfully implement Cisco IBNS?

installation of a Cisco 80x.1X supplicant

configuration of a native operating system authenticator

installation of an open-source supplicant

installation of an open-source authenticator

A

installation of an open-source supplicant

26
Q

What is a characteristic of a 802.1X single-host mode?

second client causes unauthorized port state
one device (first MAC address) authenticated
all subsequent devices get access based on first device authentication
multiple hosts can be attached to a single 802.1X-enabled port

A

Second client causes unauthorized port state. In single-host mode, only one client can be connected to the 802.1X-enabled port.