Secure Wireless Protocols and What They are used for Flashcards

1
Q

weakest form of wireless security, uses a 40 bit key that is easy to crack

A

Wired Equivalent Privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

replaces WEP as it uses the Temporal Key Integrity Protocol (TKIP), which is designed to be more secure thanWEP.

A

Wifi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

much stronger than WPA as it uses Counter Mode with the Cipher Block Chaining Message Authentication Code Protocol.
-strongest version of ____ CCMP as it uses 128 bit AES for authentication

A

Wifi Protected Access Version 2 (WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

introduced for home user who does not have an enterprise setup. The home user enters a password of the wireless router to gain access to the home network; common nowadays

A

WPA2 Preshared Keys (WPA2-PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

corporate version of WPA2 where a RADIUS server combines with 802.1x using certificates for authentication. It is used in a centralized domain environment

A

WPA2-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA security configuration that could be used for backward compatibility with legacy systems.

A

WPA2-TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the strongest version of WPA2 as it uses 128 bit AES for authentication

A

WPA2-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When we access our wireless network or gaming console we may use ____, where the password is already stored and all you need to do is press the button to get connected to the wireless network–can be victim of brute force attack

A

WPA2-WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

released in 2018 to address weaknesses in WPA2 and uses much stronger 256 bit Galois Counter Mode Protocol GCMP-256 for encryption. There are 2 versions personal for home users and enterprise for corporat

A

Wifi Protected Access Version 3 (WPA3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enterprise version that supports 256 bit AES

-uses Elliptec Curve DIffie Hellman EPhemeral (ECDHE) for initial handshake

A

WPA3 Enterprise

–government and finance departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This uses SAE which means that users can use passwords that are easier to remember. Also uses PFS-perfect forward secrecy which ensures session keys cannot be compromised

A

WPA3 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

authentication framework allowing point to point connections

the WAP will send authentication information

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

version of EAP that encapsulates and encrypts the EAP data and makes it more secure for WLANS

used in VPN’s, Secure Network access, and enterprise wifi networks

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

developed by Cisco, is used in wireless networks and point to point connections to perform session authentication

–typically used in enterprises to provide secure and fast authentication

A

EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

secure version of wireless authentication as it requires X509 certification. This is stored on endpoint

–used in high security environments such as financial, government, or corporate networks

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

uses two phases, the first to set up a secure session with the server by creating a tunnel utilizing certificates, which will then use a protocol such as MS CHAP to complete the session. It is designed to connect older legacy systems

–It is often used in environments where compatibility with multiple authentication methods is necessary.

A

EAP TTLS

17
Q

transparent to users as it uses certificates for authentication and can be used in conjunction wit a RADIUS server for enterprise networks

A

IEEE 802.1x

18
Q

federation service where access to the network is gained by using WAPs. Has nothing to do wit RADIUS server.

–used in cloud environments for single sign on
–used in roaming environments
–used in multi domain environments

A

RADIUS federation