Wireless Security Protocols Abd Aurhentication Methods Flashcards
What are two wireless security protocols?
WiFi Protected Access 2 (WPA2) and WPA3
WPA2 and WPA3 are commonly used protocols for securing wireless networks.
What does TKIP stand for?
Temporal Key Integrity Protocol
TKIP is a security protocol used in wireless networks.
What encryption standard is used in WPA2 vs WPA3?
Advanced Encryption Standard (AES) vs Simultaneous authentication of equals( SAE)
## Footnote
AES is a symmetric encryption algorithm widely used for securing data.
SAE replaces 4 way handshake
Name an authentication method used in wireless security for Servers
Remote Authentication Dial-In User Service (RADIUS)
RADIUS is a networking protocol that provides centralized Authentication, Authorization, and Accounting used for vpn cobcetrator
What does TACACS+ stand for?
Terminal Access Controller Access-Control System Plus
TACACS+ is a protocol used for providing centralized Authentication, Authorization, and Accounting services to Cisco APPLIANCES
What is Kerberos?
An authentication protocol that uses tickets to allow nodes to prove their identity securely
Kerberos is widely used in MS network environments to provide strong authentication.
What is multifactor authentication?
An authentication method that requires more than one form of verification
Multifactor authentication enhances security by requiring multiple proofs of identity.
Compare WPA2 and WPA3.
WPA2 uses TKIP or AES, while WPA3 uses only AES and offers improved security features
WPA3 provides enhancements like better protection against brute-force attacks.
Fill in the blank: The encryption protocol used in WPA2 is _______.
Advanced Encryption Standard (AES)
AES is crucial for securing data in wireless communications.
True or False: TKIP is more secure than AES.
False
AES is considered more secure than TKIP.