Section 3.4 Install and configure wireless security settings Flashcards

1
Q

Without proper ___________, any person with a wireless device can connect to your network and eavesdrop or access private data?

A

Security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Using you wireless device on an open unencrypted network could mean what?

A

Your passwords and private data are being transmitted in clear text and could be captured by hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What concept heavily involves the use of encryption techniques coupled with traditional security mechanisms such as access control and authentication?

A

Wireless Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What wireless security protocol used the RC4 key encryption algorithm, along with a weak 40-bit initialization vector as a seed, to encrypt communications before they were transmitted over the wireless network?

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What wireless security protocol encrypted data with a 128-bit key that was routinely changed during sessions using the Temporal Key Integrity Protocol (TKIP)?

A

Wi-Fi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What authentication protocol is used primarily in WPA and WPA2 based wireless networks for securely transporting authentication data?

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What authentication protocol uses TLS to transport EAP within an encrypted communications tunnel over a wireless connection?

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What authentication protocol establishes a secure tunnel through the use of a Protected Access Credential (PAC) and has 3 phases?

A

EAP Flexible Authentication via Secure Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most common Internet standard used for authenticating clients in a client-server environment?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of servers authenticate remote users accessing a network through a network device?

A

RADIUS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What was designed to allow users with less technical savvy to easily set up a wireless network and associated devices?

A

Wi-Fi Protected Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What wireless security method was designed to halt users before accessing a wireless network by trapping packets until a browser is opened?

A

Captive Portals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a physical examination and review of you current network environment?

A

Site Survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What helps determine the best placement and coverage for wireless access points?

A

Site Survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call a visual representation of the wireless signal strength that can be used to find dead zones or areas that need further coverage from current or new WAPs?

A

Heat Maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term describes how an electronic signal becomes weaker over greater distances? This applies to both cable and wireless signals.

A

Attenuation

17
Q

The default channel on many wireless routers is channel?

A

6

18
Q

What encryption protocol ensures the highest level of encryption security?

A

WPA3