perimeter defense III Flashcards

1
Q

a _____ server is required to centralize user accounts and authentication information

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this 802.1x authentication protocol is a set of interface standers that allows the use of various authentication methods

A

Extensible Authentication protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this 802.1x authentication protocol is a Cisco wireless authentication protocol

A

light weight (LEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this 802.1x authentication protocol l provide authentication in a SSL/TLS tunnel with a single certificate

A

Protected (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is an optional component of the 802.11 specifications and was deployed in 1997.

A

wired equivalent privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ is the implementation name for wireless security based on initial 802.11i drafts and was deployed in 2003.

A

Wi-Fi protected access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ adheres to the 802.11i specifications and was deployed in 2005

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this wireless network attack looks for any unauthorized access point added to a network

A

rouge access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this wireless network attack happens when a attacker scans an area looking for wireless access

A

wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

symbols are drawn n public places to advertise the status of a wireless network is called

A

warchalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the interception and possible decoding of wireless transmissions.

A

packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a seed value is used in encryption

A

initialization vector attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly