Wireless Security Flashcards

1
Q

what is WEPs weakness?

A

its 24 bit IV (initialization vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does an “open” network indicate?

A

so security and/or no protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does WEP indicate?

A

initialization vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does WPA indicate?

A

TKIP and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does WPA2 indicate?

A

CCMP and AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is WPS?

A

wi fi protected setup. automated encryption set up for wireless networks at a push of a button, but is severely flawed and vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is OWE?

A

Opportunistic Wireless Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is SAE?

A

Simultaneous Authentication of Equals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does SAE work?

A

a secure password based authentication
and key agreement that relies on forward security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is Forward Secrecy?

A

assures the session keys will not be compromised even if the long term secrets used in the session key exchange have been compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the first step of forward secrecy?

A

API and client use a public key system to generate a pair of long term keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the second step of forward secrecy?

A

AP and client exchange a one time use session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is step three of forward secrecy?

A

API sends client messages and encrypts them using the created session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the fourth step of forward secrey?

A

client decrypts received messages using the same one-time use session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the fifth step of forward secrecy?

A

process repeats for each message being sent, starting at step 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is RADIUS?

A

Remote Authentication Dial In User Service

17
Q

what does RADIUS do?

A

cross platform protocol that authenticates and authorizes users to services and accounts for their usage.

18
Q

what is TACACS+?

A

Cisco proprietary protocol that provides separate authetication, authorization and accounting services.

19
Q

what is diameter?

A

peer to peer protocol created as a next generation version of RADIUS

20
Q

what is LDAP?

A

Lightweight Directory Access Protocol

21
Q

what does LDAP do?

A

cross platform protocol that centralizes info about clients and objects on the network.

22
Q

what is SSO?

A

single sign on

23
Q

what does SSO do?

A

enables users to authenticate once and receive authorizations for multiple services across the network.

24
Q

what is kerberos?

A

uses symmetric encryption and key distribution center to conduct authentication and authorization functions.

25
Q

what is the 802.1x framework?

A

used for port based authentication on both wired and wireless networks.

26
Q

what is EAP?

A

Extensible Authentication Protocol

27
Q

what does EAP do?

A

allows for numerous different mechanisms of authentication.

28
Q

what is EAP-MD5

A

utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication.

29
Q

what is EAP-TLS?

A

uses public key infastructure with a digital certificate being installed on both client and the server.

30
Q

what is EAP-TTLS?

A

requires a digital certificate on the server and a password

31
Q

what is EAP-FAST?

A

uses a protected access credential to establish mutual authentication between devices.

32
Q

what is PEAP?

A

protected EAP. uses server certificates and microsofts active directory databases to authenticate a clients password.

33
Q

what is LEAP?

A

Lightweight EAP a propriatary protocol that only works on CISCO based devices.

34
Q

how can you enable wireless encryption?

A

by configuring your wireless access point.