Networking Security Flashcards

1
Q

What is AAA stand for?

Hint: AAA is a misnomer

A
  • I = Identification (Hidden)
  • A = Authentication
  • A = Authorization
  • A = Accounting
  • A = Auditing (Hidden)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of:

  • Identification
  • Authentication
  • Authorization
  • Accoutning
  • Auditing
A
  • Providing Username
  • Proving you say who you are
  • Getting Access
  • Collecting Logs
  • Review of Logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is RADIUS?

A

A AAA Solution for Network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 3 characteristics of RADIUS?

A
  • Primarily used for network access
  • Combines authentication and authorization
  • Encrypts only the password in the access-request packet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is TACACS+?

A

Similar to RADIUS, but for network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 3 characteristics of TACACS+?

A
  • Encrypts the entire payload of the access-request packet
  • Primarily used for device administration
  • Separates authentication and authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What wireless encryption scheme offers the highest level of protection?

  • What encryption schemes can be used for it and which is best?
A

WPA3

  • AES-CCMP
  • AES-GCMP (Best)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security protocol is designed to strengthen WEP implementations?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What cryptographic algorithm is the least vulnerable to attacks?

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption scheme is used in WiFi Protected Access 2 (WPA2)?

A

AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What refers to a client authentication method used for the following:

  • WPA2 Personal mode
  • WPA3 Personal mode
A
  • PSK (Pre-Shared Key)
  • SAE (Simultaneous Authentication of Equals)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would be the best solution for securing a small network that lacks an authentication server?

A

WPA3-SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 characteristic features of WPA2/WPA3 Enterprise mode?

A
  • Used for Large Corporate Networks
  • IEEE 802.1X
  • Requires RADIUS Authentication Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What authentication protocol can be used to enable SSO in Windows-based network environments?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the Kerberos-based authentication process, the purpose of the client’s timestamp is to provide a countermeasure against:

A

Replay Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 basic fundamental Wi-Fi Security practices?

A
  1. Disable SSID Broadcast
  2. Use WPA2/WPA3
  3. Disable WPS
  4. Enable Content Filter