Section 21. 200 Wireless Security Settings Flashcards

Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Wireless Security Settings

A

Crucial for securing wireless networks due to increasing usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Encryption

A

Wireless encryption is essential for data confidentiality in wireless networks

Secures Wirless networks from data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WEP (Wired Equivalent Privacy)

A

■ Introduced in 1999 as part of IEEE 802.11

■ Utilises a static encryption key system

■ Considered insecure due to its weak 24-bit initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA (Wi-Fi Protected Access)

A

■ Introduced in 2003 as an improvement over WEP

■ Implemented TKIP for dynamic key generation

■ Inherited some vulnerabilities from WEP

■ Due to TKIP vulnerabilities, it was susceptible to cryptographic attacks

■ Insecure due to insufficient data integrity checks in the TKIP implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA2 (Wi-Fi Protected Access 2)

A

■ Introduced in 2004, replacing WPA

■ Uses AES protocol and CCMP protocol for stronger encryption:

● AES - Advanced Encryption Standard
● CCMP - Counter Cipher Mode with Block Chaining Message Authentication Code

Introduced Message Integrity Code (MIC) for integrity checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA3 (Wi-Fi Protected Access 3)

A

■ The latest and most secure wireless security protocol

■ Uses AES for encryption and introduces new features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPA3 (Wi-Fi Protected Access 3) Features

Simultaneous Authentication of Equals (SAE)

A

Replaces the 4-way handshake with a Diffie-Hellman key
agreement

○ Protects against offline dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WPA3 (Wi-Fi Protected Access 3) Features

Enhanced Open (Opportunistic Wireless Encryption)

A

Provides individualised data encryption even in open networks

○ Improves privacy and security in open Wi-Fi scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WPA3 (Wi-Fi Protected Access 3) Features

Updated Cryptographic Protocols

A

AES GCMP replaces AES CCMP used in WPA2

○ Supports both 128-bit and 192-bit AES for enhanced security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA3 (Wi-Fi Protected Access 3) Features

Management Frame Protection

A

○ Ensures the integrity of network management traffic

Prevents eavesdropping, forging, and tampering with
management frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA Protocols

A

Important for centralised user authentication and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AAA Protocols examples

RADIUS (Remote Authentication Dial-In User Service)

A

○ Offers Authentication, Authorization, and Accounting services

○ Widely used for secure access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AAA Protocols examples

TACACS+ (Terminal Access Controller Access-Control System Plus)

A

Separates Authentication, Authorization, and Accounting
functions

○ More granular control

○ Encrypts the authentication process using TCP for enhanced security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication Protocols

A

Used to verify user identity and control network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication Protocols examples

EAP (Extensible Authentication Protocol)

A

● Authentication framework supporting multiple methods

● Provides common functions and negotiation of authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication Protocols examples

PEAP (Protected Extensible Authentication Protocol)

A

● Encapsulates EAP within an encrypted TLS tunnel

● Developed jointly by Cisco Systems, Microsoft, and RSA Security

17
Q

Authentication Protocols examples

EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)

A

● Extends TLS support across platforms

● Requires server-side certificates for security

18
Q

Authentication Protocols examples

EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling)

A

● Developed by Cisco Systems for secure re-authentication

● Uses a Protected Access Credential and TLS tunnel