Wireless Security settings Flashcards

1
Q

WPA2 (WiFi protected access)PSK problem

A

-is a security protocol used to secure wireless networks. One of the modes of WPA2 is Pre-Shared Key (PSK), which is commonly used in home networks and small businesses

-with the hash, attackers can brute force the psk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA3 and GCMP (Galois/Counter Mode Protocol)

A

WPA3 uses GCMP (Galois/Counter Mode Protocol) for encryption, which provides both confidentiality and integrity. This mode of operation combines the counter mode of encryption with Galois mode of authentication, allowing for faster and more efficient encryption while ensuring data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAE Simultaneous Authentication of Equals

A

is a secure key establishment protocol used in WPA3 (Wi-Fi Protected Access 3) to enhance the authentication process for wireless networks. It serves as a replacement for the Pre-Shared Key (PSK) method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RADIUS (remote authentication dial-in user service)

A

a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IEEE 802.1x

A

-is a network access control standard that defines a framework for authenticating and authorizing devices attempting to connect to a network

-used in conjunction with an access database. (Radius, LDAP, TACACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP (extensible authentication protocol)

A

a framework that allows for multiple authentication methods to be used to secure network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IEEE 802.1x and EAP

A

-are integral components of network security, particularly for controlling access to wired and wireless networks. They work in conjunction to authenticate users and devices before granting access to network resources

-Components:
- Supplicant: The client device that wants to connect to the network and must be authenticated.
- Authenticator: The network device (such as a switch or wireless access point) that acts as a gatekeeper, controlling access to the network.
- Authentication Server: A back-end server (commonly a RADIUS server) that performs the actual authentication of the supplicant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly