perimeter defense III Flashcards
a _____ server is required to centralize user accounts and authentication information
RADIUS
this 802.1x authentication protocol is a set of interface standers that allows the use of various authentication methods
Extensible Authentication protocol (EAP)
this 802.1x authentication protocol is a Cisco wireless authentication protocol
light weight (LEAP)
this 802.1x authentication protocol l provide authentication in a SSL/TLS tunnel with a single certificate
Protected (EAP)
____ is an optional component of the 802.11 specifications and was deployed in 1997.
wired equivalent privacy (WEP)
______ is the implementation name for wireless security based on initial 802.11i drafts and was deployed in 2003.
Wi-Fi protected access (WPA)
____ adheres to the 802.11i specifications and was deployed in 2005
WPA2
this wireless network attack looks for any unauthorized access point added to a network
rouge access point
this wireless network attack happens when a attacker scans an area looking for wireless access
wardriving
symbols are drawn n public places to advertise the status of a wireless network is called
warchalking
the interception and possible decoding of wireless transmissions.
packet sniffing
a seed value is used in encryption
initialization vector attack