wireless security settings Flashcards

1
Q

_____ provides authentication, authorization, and accounting services for wireless clients. Users can use their personal accounts to gain wireless network access.

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is a wireless network port authentication protocol used in IEEE 802.11 Standard to deliver session WEP keys to wireless network users

A

Extensible Authentication Protocol (EAP) over Wireless (EAPoW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1x is configured by selecting the Wi-Fi Protected Access (WPA) setting for _____ or _____ as the security method on the access depending on the wireless router model type.

A

WPA2-Enterprise or WPA3-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _____ is a software tool that can scan for wireless signals in the area.

A

Wi-Fi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Remote Access Dial-in User Server (RADIUS) is required to complete the 802.1x setup. The wireless controller connects to the RADIUS server with a _____, then credentials can be properly authenticated.

A

shared secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____, which is the Port-based Network Access Control framework, establishes several ways for devices and users to be securely authenticated before they are permitted full network access. Extensible authentication protocol (EAP) is the actual authentication mechanism.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is a feature on most consumer wireless routers to assist residential consumers to automate the setup process.

A

Wi-Fi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Channels have ~5 MHz spacing, but Wi-Fi requires _____ of channel space.

A

20 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ enables a client and server to establish a secure connection without mandating a client-side certificate. The user authentication method (also referred to as the “inner” method) works with the Microsoft Challenge Handshake Protocol (MS-CHAP).

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is Cisco Systems’ proprietary EAP implementation. It is vulnerable to password cracking attacks.

A

Lightweight Extensible Authentication Protocol (LEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ requires a server and client-side public key certificate. An encrypted TLS tunnel is established between the supplicant and authentication server using this method.

A

Extensible Authentication Protocol with Transport Layer Security (EAP-TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is a secure password-based authentication and key agreement method used in Wireless Protected Access version 3 (WPAv3).

A

Simultaneous Authentication of Equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ does not use certificates but a Protected Access Credential (PAC), which is generated for each user from the authentication server’s master key.

A

EAP with Flexible Authentication via Secure Tunneling (EAP-FAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a common security setting for consumer wireless routers that allow users to enter a password to access the wireless network

A

Pre-shared key (PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is a standard encryption algorithm compatible with WPA2.

A

Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ is a feature of WPA version 3 that enables encryption for the open authentication method.

A

Enhanced open

17
Q

Wi-Fi Protected Access version 3 (WPA3) uses _____ that replaces the 4-way handshake protocol with a protocol based on Diffie-Hellman key agreement.

A

Simultaneous Authentication of Equals (SAE)

18
Q

_____ is an authentication framework that is used in local area networks (LANs) and dial-up connections.

A

Extensible Authentication Protocol (EAP)

19
Q

_____ is Cisco’s replacement for LEAP. It addresses LEAP vulnerabilities using Transport Layer Security (TLS) with Protected Access Credential (PAC) instead of certificates.

A

Flexible Authentication via Secure Tunneling (EAP-FAST)

20
Q

_____ uses a server-side public key certificate to create an encrypted tunnel between the supplicant and authentication server. This an industry standard.

A

Protected Extensible Authentication Protocol (PEAP)