Wireless Authentication Flashcards

1
Q

Supplicant

A

EAP client device requesting network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authenticator

A

Network device (AP or switch) that forwards authentication messages and enforces access policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authenticator Server

A

Central server (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EAP-FAST

A

An EAP method that uses a protected TLS tunnel (with a PAC) for secure authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phases of EAP-FAST

A

Phase 1: Request initiation. Phase 2: Establish TLS tunnel. Phase 3: Grant network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP-TLS

A

Uses TLS and X.509 certificates to mutually authenticate supplicants and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EAP-TTLS

A

Establishes a secure TLS tunnel (typically with only a server certificate) to encapsulate inner client authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.1X

A

IEEE standard for port-based network access control using EAP over the data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAPoL

A

Protocol for transmitting EAP messages over wired LAN connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAPoW

A

Informal term for applying EAP methods over wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PEAP

A

Uses a server certificate to create a TLS tunnel and inner EAP (often MSCHAPv2) for client authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPS

A

Simplified wireless network setup via a push-button or PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Null Authentication Algorithm

A

A configuration where no authentication is performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Open System Authentication Model

A

Wireless access model that allows connection without credential verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shared Key Authentication Process

A

IEEE 802.11 method (often used with WEP) using a pre-shared key for challenge–response authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless Centralized Server Authentication

A

802.1X-based authentication for wireless networks

17
Q

PICAS

A

P – Physical limitations
I – Inventory of users and devices
C – Communication allowed
A – AP installation permission
S – Security standards