Wireless Encryption and Authentication Facts Flashcards

1
Q

When configuring a wireless network, it is imperative to properly secure all data. This means ensuring that only authenticated users can access the network and that all data is encrypted using the appropriate algorithms. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless networks today use either the WPA2 or WPA3 security standards along with an appropriate encryption algorithm. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-was used with the WPA and WPA2 wireless security standards.
-was developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard.

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WEP uses the same session key for the entire session. This makes it extremely easy to crack, allowing an attacker to intercept all data. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With TKIP, each packet has a unique encryption key. TKIP accomplishes this by mixing:

A

-A base key
-The MAC address of the wireless access point.
-A packet serial number
-The serial number is changed for each packet which results in a new encryption key for each packet.
-The encryption key for each packet is 128-bits and is based on the Rivest Cipher 4 (RC4) encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is known to have vulnerabilities and is no longer considered secure and should not be used on modern wireless networks.

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is based on the Rijndael algorithm

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-_____ keys can be either 128, 192, or 256 bits and encrypts data in 128-bit chunks.
-_____ is typically combined with the Counter Mode with Cipher Block Chaining Message Authentication (CCMP) to enhance the security of the wireless network.
-_____ is considered one of the strongest encryption protocols and is used in more than just wireless networks.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You should implement authentication protocols to ensure that only authorized users can access the wireless network. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote Authentication Dial-In Service (RADIUS)

A

-is an open standard protocol used to authenticate users onto a network
-is an open standard and can be used by any manufacturer.
-Sends a user’s credentials over UDP.
-Encrypts only the password. The username is sent in cleartext.
-Uses port 1812 for authentication and authorization.
-Uses port 1813 for accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Terminal Access Controller Access-Control System (TACACS+)

A

-was developed by Cisco to address security concerns in RADIUS.
-is used only on Cisco devices.
-sends a user’s credentials over TCP.
-encrypts all data packets including username and password.
-uses port 49 for all communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ was developed at MIT and is a key component of Windows Active Directory

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos has three main components:

A

-Client
-Authentication server (typically the Active Directory server)
-Trusted Key Distribution Center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a user attempts to login to the network, the following process occurs:

A

-The user’s credentials are sent to the authentication server.
-The authentication server validates the user’s credentials, and sends back a session key and a ticket granting ticket.
-The user sends the session key and ticket granting ticket to the KDC. The KDC sends back a ticket that authenticates the user for the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Using tickets, _____ allows clients and servers to authenticate with each other seamlessly throughout the network.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ are both considered AAA protocols.

A

RADIUS and TACACS+

17
Q

AAA means the protocol provides:

A

-Authentication: proves the user’s identity.
-Authorization: defines what the user can access.
-Accounting: logs what the user accessed while on the network.

18
Q

Kerberos provides only authentication, not authorization and accounting. (true/false)

A

true