NAC Flashcards

1
Q

Why should you avoid using Open Authentication by itself in an enterprise wireless deployment?

A

With Open Authentication, no authentication is performed by the wireless client before associating with an AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two authentication modes available to you when using a version of WPA?

A

Pre-Shared Key (Personal mode) and 802.1X (Enterprise mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where is the supplicant located when using 802.1X to authenticate wireless clients?

A

On the wireless access client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With WebAuth, which type of Layer 3 security authenticates wireless users against a local database?

A

Local web authentication with an internal database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What wireless authentication method uses the more secure Advanced Encryption Standard (AES) and pre-shared key for authentication?

A

WPA2 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What wireless authentication method utilizes user-level authentication along with 802.1X standards with AES encryption?

A

WPA2 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What wireless authentication method uses simultaneous authentication of equals (SAE) to build on WPA2 PSK to allow users to authenticate with a passphrase only?

A

WPA3 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What wireless authentication method provides protection for a network transmitting sensitive data by offering 192-bit cryptographic strength? This is considered the most secure wireless authentication method.

A

WPA3 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which 802.1X component is the client device that is requesting access to the network?

A

Supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which 802.1X component is the network device that is providing access to the network?

A

Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which 802.1X component is the device that accepts the user or client credentials and denies or permits access to the network based on policies and a user database?

A

Authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

With wireless client authentication, what two devices share the PSK?

WLC and AP

Wireless client and WLC

Wireless client and AP

WLC and RADIUS server

A

Wireless client and AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following wireless authentication methods is considered the most secure?

WPA2 Personal

WPA2 Enterprise

WPA3 Personal

WPA3 Enterprise

A

WPA3 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: When using WebAuth, passthrough mode does not require wireless users to enter credentials on a web page.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which wireless authentication method can you use with Open Authentication to present an acceptable use policy acknowledgment?

PSK

WebAuth

EAP

RADIUS

A

WebAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following wireless authentication methods does WPA3 Personal support?

Open Authentication

PSK

EAP

WebAuth

17
Q

Which wireless authentication method is required if you want to integrate wireless client authentication with 802.1X?

Open Authentication

PSK

EAP

WebAuth

18
Q

Which of the following EAP authenication protocols requires both a client and a server digital certificate?

PEAP

EAP-TLS

LEAP

EAP-FAST

19
Q

Which of the following EAP authenication protocols only requires the server to have a digital certificate and clients can have a one-time password?

PEAP

EAP-TLS

LEAP

EAP-FAST

20
Q

Which EAP authentication protocol is very secure, and requires client certificates to be installed on each Wi-Fi workstation? This approach requires a PKI infrastructure with extra administrative expertise.

PEAP

EAP-TLS

LEAP

EAP-FAST

21
Q

Which EAP authentication protocol is secure and requires only server-side certificates? Use of a PKI is optional. Cisco and Microsoft both support this type.

PEAP

EAP-TLS

LEAP

EAP-FAST

22
Q

Which EAP authentication protocol is a secure solution for enterprises that cannot enforce a strong password policy and do not want to deploy certificates for authentication?

PEAP

EAP-TLS

LEAP

EAP-FAST

23
Q

Which EAP authentication protocol addresses the certificate issue by tunneling TLS, and thus eliminating the need for a certificate on the client side? This type is a proprietary standard, and there is a charge for supplicant and authentication server software.

PEAP

EAP-TLS

EAP-TTLS

EAP-FAST

24
Q

Which EAP authentication protocol was previously a Cisco proprietary type, but now licensed to other vendors? A strong password policy should be enforced when used for authentication to prevent dictionary attacks. Not recommended for enterprise deployments.

25
What do Linux clients require to successfully implement Cisco IBNS? installation of a Cisco 80x.1X supplicant configuration of a native operating system authenticator installation of an open-source supplicant installation of an open-source authenticator
installation of an open-source supplicant
26
What is a characteristic of a 802.1X single-host mode? second client causes unauthorized port state one device (first MAC address) authenticated all subsequent devices get access based on first device authentication multiple hosts can be attached to a single 802.1X-enabled port
Second client causes unauthorized port state. In single-host mode, only one client can be connected to the 802.1X-enabled port.