Wifi Flashcards

1
Q

The first interation of ., shared password encryption, easy to crack. Implement a poor usage of RC4. Should not be used anymore.

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption protocol used on WEP.

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wifi protocol that uses dynamic key and larger key sizes TKIP and RC4, considered secure.

A

WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wifi protocol that uses a PSK and AES as a encryption standard, considered the most secure one.

A

WAP2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Has a goal to enable anyone to join to the AP just by pressing two buttons. Has a 8 digit pin to use at the client side that is easy to crack.

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IEEE standard, port-based access control. Has a wireless client known as supplicant and authenticator, and a source providing authentication servers such as RADIUS and TACACS+.

A

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication protocol that provides for a varied authentication methods. Allows for mutual authentication between devices as well as directory-based authentication services. There are several different variatons of this protocol.

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication protocol that uses TLS. Requires both a server-side certificate and a client side certificate. If you want the ultimate in 802.11 authentication security, this protocol is the way to go.

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication protocol that only requires a server-side certificate. Goes beyond the TLS protocol, adding a tunnel to provide better security.

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication protocol that is a improved version of EAP-TLS, requires a digital certificate on the server side connection to create a secure TLS tunnel. Typically use digital certificates or smart cards for authentication.

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proprietary authentication protocol developed by Cisco used in wireless. Uses dynamic WEP keys and provides mutual authentication and a centralized RADIUS server. Requires wireless clients to reauthenticate periodically.

A

LEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly