Supplemental Flashcards
when a client sends a request to a WAP, they are added to that devices ___
Associated List
the first step in giving 802.11 some security was ___, which uses the ___ encryption protocol
Wired Equivalency Privacy (WEP); RC4
WEP uses encryption keys ___, making it relatively easy to hack
that are generated by the WAP and shared
the current standard for wireless encryption is ___, also known as ___
802.11I, WPA2
802.11i/WPA2 uses ___ for authentication using a ___ server, and the ___ encryption protocol.
802.1x; RADIUS; AES
because much of the hardware couldn’t handle AES encryption when 802.11i was released, the ___ was developed and later named ___
Temporal Key Integrity Protocol (TKIP); Wireless Protected Access (WPA)
TKIP/WPA improved the ___ of key generation and WPA2 uses AES encryption via ___
initialization vector; CCMP
RADIUS solves the problem of ___, but not ___.
authentication; authorization
RADIUS servers refer to the internet gateway as the ___ and the user trying to authenticate as the ___
client; supplicant
RADIUS servers can use any of the following ports:
UDP 1812, 1813, 1645, 1646
Windows networks have two particular authentication protocols, one is ___ in which the client and server both send challenge messages, and the other is ___, in which the Domain Controller acts as a ___
NT LAN Manager; Kerberos; Key Distribution Center (KDC)
the TKIP increased the key initialization vector from ___ bits to ___
24; 48
UNIX systems use a ___ to protect their hashed password database
shadow password file
in ___ a physical chip installed on a device holds passwords, keys and digital signatures for authentication
Trusted Platform Module (TPM)
Bitlocker is an example of built in ___
Whole Disk Encryption
the ___ files on a computer cannot be encrypted, making ___ on startup critical
boot process; authentication
___ hashing is commonly used in digital signatures
Message Digest
a ___ attack takes advantage of occasional hashing collisions
birthday
___ hash algorithms were developed by the NSA and are used in PGP, TLS, SSL and IPsec because they are considered more secure than MD5
Secure Hash Algorithm (SHA)
unlike AES, DES or Blowfish, ___ is a streaming cipher
RC4
IPsec uses two modes, ___ and ___ mode
transport; tunnel
___ is a secure form of Telnet
Secure Shell (SSH)
HTTPS is secured with ___
either SSL or TLS
the easiest disaster recovery exercise is a ___
document review