Security: Compare and contrast wireless security protocols and authentication methods Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What is the Protocol and Encryption of WPA2?

A

Wi-Fi Protected Access 2 (WPA2) - encrypts information packets as they are sent out from the access point or wireless network card using the Advanced Encryption Standard (AES) algorithm. When WPA2 is enabled with the strongest encryption option, anyone within network range may be able to see the traffic, but it is scrambled using the most recent encryption standards and is accepted by the Department of Defense as the industry standard. This standard has stood for quite some time and is still continued to be supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Protocol and Encryption of WPA3?

A

Is the most recent generation of Wi-Fi security, released in 2018. It has not yet gained widespread acceptance, but it aims to improve some security aspects that WPA2 lacks, such as securing open networks, protecting simple passwords, and simplifying device configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference with WPA2 and WPA3?

A

WPA3 has Enhanced encryption. WPA3 protocols call for GCMP-256 encryption rather than 128-bit encryption used in prior versions. It’s much harder for one user to snoop on someone else’s traffic with this method.

Stronger protections. A user can make one offline password guess. Brute-force attacks, in which a hacker uses hundreds of tries, aren’t possible. S

Secure Hand Shake: In WPA3 encryption, devices use so-called Simultaneous Authentication of Equals (SAE). It’s much harder to eavesdrop passwords, and that could keep devices safer.

Downfalls of WPA3 - Not widely supported yet

WPA2 does not provide similar security for public networks. Protection against Attacks: WPA3 addresses some security vulnerabilities and weaknesses found in WPA2, including the KRACK (Key Reinstallation Attack) vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is TKIP used for?

A

Temporal Key Integrity Protocol (TKIP) is an older encryption protocol used with WPA, and CCMP is the newer encryption protocol used with WPA2. IEEE has deprecated WPA and TKIP due to various security issues, but many wireless networks are still using these older protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AES?

A

Advance Encryption Standard - TKIP also turned out to be insecure, so a new standard called WPA2 was created, which uses AES, or Advanced Encryption Standard. AES is much more secure because it uses longer encryption keys and has been on almost all new Wi-Fi routers sold in the last few years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the RADIUS functions?

A

In enterprise mode in WAP Settings – Remote Access Dial In User Service – Authenticate a remote client trying to make into a wireless network.

Requires each network device have preconfigured settings

It utilizes a combination of Authorization & Authentication - Designed for AAA ( Authorization & Authentications & Accounting) Subscription - Users and Clients

Minimal Vendor Support for Authorization

Uses UDP to access the wireless network - 1645/1646 - 1812/1813

Less Secure and only uses Password Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main difference of RADIUS and TACACS+

A

Terminal Access Controller Access-Control System - Uses TCP connections. Port 49

Separates AAA functions - More flexible and is used for Administration

Central Management for Authorization Configuration

Supported by most vendors

The main difference between RADIUS and TACACS+ is that RADIUS is mainly a network access protocol for user authentication, whereas TACACS+ is predominantly used for administrating network devices like routers and switches

More secured and encrypts the whole packet including username and password + Attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Kerboros?

A

A Kerberos is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network.

Kerberos uses symmetric key cryptography and a key distribution center (KDC) to authenticate and verify user identities.

Verifies users and Service - before session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits of using Kerberos Authentication system?

A

Delegated authentication.

Single sign on.

Interoperability.

More efficient authentication to servers.

Mutual authentication.

https://www.youtube.com/watch?v=Xjpi8xYqPcY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multifactor authentication?

A

That’s why almost all online services - banks, social media, shopping and yes, Microsoft 365 too - have added a way for your accounts to be more secure. You may hear it called “Two-Step Verification” or “Multifactor Authentication” but the good ones all operate off the same principle. When you sign into the account for the first time on a new device or app (like a web browser) you need more than just the username and password. You need a second thing - what we call a second “factor” - to prove who you are.

A factor in authentication is a way of confirming your identity when you try to sign in. For example, a password is one kind of factor, it’s a thing you know. The three most common kinds of factors are:

Something you know - Like a password, or a memorized PIN.

Something you have - Like a smartphone, or a secure USB key.

Something you are - Like a fingerprint, or facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly