Wireless Security Flashcards

1
Q

Same encryption key is used by the access point and the client

A

Pre-Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Original 802.11 wireless security standard that claims to be as secure as a wired network. (40-bit encryption key that later upgraded to a 64-bit key, and then again to 128-bit key.)

A

WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Replacement for WEP, which uses TKIP, Message Integrity Check (MIC), and RC4 encryption

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11i standard to provide better wireless security featuring AES with 128-bit key, CCMP, and integrity checking

A

Wi-Fi Protected Access version 2 (WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you remember for each:
- Open
- WEP
- WPA
- WPA2

A
  • Open - No security or protection provided
  • WEP - IV (initialization vectors)
  • WPA - TKIP and RC4
  • WPA2 - CCMP and AES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable

A

Wi-Fi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Latest and most secure version of wireless network encryption currently available. (Uses 192-bit key or 128-bit key, and uses GCMP (Galois Counter Mode Protocol), and includes SAE)

A

Wi-Fi Protected Access 3 (WPA3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A secure password-based authentication and password authenticated key agreement that relies on forward secrecy (uses dragonfly handshake, used in WPA3)

A

Simultaneous Authentication of Equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OWE

A

Opportunistic Wireless Encryption (OWE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assures the session keys will not be compromised even if the long-term secrets used in the session key exchange have

A

Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cross-platform protocol that authenticates and authorizes users to services, and accounts for their usage

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cisco-proprietary protocol that provides separate authentication, authorization, and accounting services

A

Terminal Access Controller Access Control System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Peer-to-peer protocol created as a next-generation version of RADIUS

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cross-platform protocol that centralizes info about clients and objects on the network

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enables users to authenticate once and receive authorization for multiple services across the network

A

Single Sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses symmetric encryption and the Key Distribution Center to conduct authentication and authorization functions

A

Kerberos

16
Q

Used for port-based authentication on both wired and wireless networks

A

802.1x framework

17
Q

Allows for numerous different mechanisms of authentication

A

Extensible Authentication Protocol (EAP) framework

18
Q

Type of EAP that utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication (both password authentication)

A

EAP-MD5

19
Q

Type of EAP that uses public key infrastructure with a digital certificate being installed on both the client and the server (both digital certificate authentication)

A

EAP-TLS

20
Q

Type of EAP that requires a digital certificate on the server and a password on the client for its authentication (one password and one digital certificate authentication)

A

EAP-TTLS

21
Q

Type of EAP that uses a protected access credential to establish mutual authentication between devices

A

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

22
Q

Type of EAP that uses server certificates and Microsoft’s Active Directory database to authenticate a client’s password

A

Protected EAP (PEAP)

23
Q

Type of EAP that is Protected EAP (PEAP) but proprietary to Cisco-based devices

A

Lightweight EAP (LEAP)

24
Q

The name of the wireless network

A

Service Set Identifier (SSID)

25
Q

3 frequency band channels

A

1) 2.4 GHz
2) 5 GHz
3) 6 GHz

26
Q

2.4 GHz networks operate on which channels?

A

channels 1-11