Wireless Security Protocols Abd Aurhentication Methods Flashcards

1
Q

What are two wireless security protocols?

A

WiFi Protected Access 2 (WPA2) and WPA3

WPA2 and WPA3 are commonly used protocols for securing wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does TKIP stand for?

A

Temporal Key Integrity Protocol

TKIP is a security protocol used in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What encryption standard is used in WPA2 vs WPA3?

A

Advanced Encryption Standard (AES) vs Simultaneous authentication of equals( SAE)
## Footnote
AES is a symmetric encryption algorithm widely used for securing data.
SAE replaces 4 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name an authentication method used in wireless security for Servers

A

Remote Authentication Dial-In User Service (RADIUS)

RADIUS is a networking protocol that provides centralized Authentication, Authorization, and Accounting used for vpn cobcetrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does TACACS+ stand for?

A

Terminal Access Controller Access-Control System Plus

TACACS+ is a protocol used for providing centralized Authentication, Authorization, and Accounting services to Cisco APPLIANCES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Kerberos?

A

An authentication protocol that uses tickets to allow nodes to prove their identity securely

Kerberos is widely used in MS network environments to provide strong authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is multifactor authentication?

A

An authentication method that requires more than one form of verification

Multifactor authentication enhances security by requiring multiple proofs of identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compare WPA2 and WPA3.

A

WPA2 uses TKIP or AES, while WPA3 uses only AES and offers improved security features

WPA3 provides enhancements like better protection against brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: The encryption protocol used in WPA2 is _______.

A

Advanced Encryption Standard (AES)

AES is crucial for securing data in wireless communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: TKIP is more secure than AES.

A

False

AES is considered more secure than TKIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly