3.4 Review Questions

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:29 AM on 7/23/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

what does wpa2 address?

vulnerabilities found in wep.

2
New cards

what encryption protocol does wpa2 use?

ccmp (counter mode with cbc-mac), which uses aes for strong data encryption.

3
New cards

what are the two methods combined in ccmp?

counter mode (for data privacy) and cbc-mac (for data tampering checks).

4
New cards

what does wpa3 offer compared to wpa2?

even stronger protection.

5
New cards

what encryption protocol does wpa3 use?

gcmp (galois/counter mode protocol).

6
New cards

what does gcmp provide for data?

confidentiality (encryption) and authenticity (integrity).

7
New cards

what are the two essential features of ccmp?

data confidentiality (encryption) and message authentication code (mac) for integrity.

8
New cards

what does data confidentiality (encryption) in ccmp protect?

the actual data.

9
New cards

what does the message authentication code (mac) in ccmp ensure?

that the data hasn’t been tampered with.

10
New cards

what does sae replace in WPA3?

the older pre-shared key (psk) method used in WPA2.

11
New cards

which key exchange method does sae rely on?

diffie-hellman key exchange.

12
New cards

what does sae include that enhances security?

mutual authentication.

13
New cards

what does eap provide in networks?

an authentication framework for various methods.

14
New cards

how does eap ensure user or device access?

by verifying their identity before granting access.

15
New cards

with which standard does eap work seamlessly?

802.1x, which is for port-based network access control.

16
New cards

what does tls ensure for communication?

secure communication by agreeing on cryptographic algorithms, verifying identities, and establishing session keys.

17
New cards

how does peap enhance authentication security?

by encapsulating eap within a secure tls tunnel.

18
New cards

what authentication method does peap use for users?

generic token card (gtc).

19
New cards

what role does the authentication server (as) play in peap?

it uses a digital certificate to ensure secure authentication.

20
New cards

do client devices need their own certificates in peap?

no, they do not.

21
New cards

how is user authentication performed in peap?

through mschapv2, verified against microsoft’s ms-chapv2 databases.

22
New cards

what is the purpose of eap-fast?

to provide secure authentication within wireless networks.

23
New cards

what is used as a shared secret in eap-fast?

a protected access credential (pac).

24
New cards

how does the supplicant receive the pac?

from the authentication server (as).

25
New cards

what role does the tls tunnel play in eap-fast?

it provides a secure channel for user authentication.

26
New cards

what role does the radius server play in eap-fast?

it provides the authentication database and eap-fast services.

27
New cards

what is the primary security feature of eap-tls?

robust security for user authentication.

28
New cards

what is required on both the authentication server and client devices in eap-tls?

digital certificates.

29
New cards

why is a public key infrastructure (pki) needed for eap-tls?

to manage and validate the certificates.

30
New cards

what must be deployed to all wireless clients in eap-tls?

certificates

31
New cards

how does eap-tls ensure secure communication?

by establishing a tls tunnel after mutual authentication.

32
New cards

what does eap-ttls allow to operate within a TLS tunnel?

other authentication protocols.

33
New cards

what does the TLS tunnel provide in eap-ttls?

a secure channel for authentication.

34
New cards

what are the certificate requirements for eap-ttls?

a digital certificate on the authentication server but not on every device.

35
New cards

what flexibility does eap-ttls offer in authentication methods?

any authentication method can be used within the TLS tunnel.

36
New cards

what does IEEE 802.1X ensure?

secure access to a network.

37
New cards

at what level does IEEE 802.1X operate?

port level (such as Ethernet switch ports or wireless access points).

38
New cards

what happens to a device until it successfully authenticates?

it is denied access to the network.

39
New cards

what must a device do to gain network access?

authenticate itself.

40
New cards

which access databases are used in conjunction with IEEE 802.1X?

RADIUS, LDAP, and TACACS+.

41
New cards

what does RADIUS Federation allow?

linking a user’s identity across multiple authentication systems.

42
New cards

what authentication methods are used in RADIUS Federation?

802.1X and EAP.

43
New cards

can members of one organization authenticate on another’s network?

yes, using their normal credentials.

44
New cards

where is pre-shared key (psk) authentication commonly used?

Commonly used in home networks and small businesses.

45
New cards

how does pre-shared key (PSK) authentication work?

the network administrator configures a shared secret (PSK) on both the access point (AP) and client devices.

when a client wants to connect, it provides the PSK during the initial handshake.

the AP verifies the PSK, and if it matches, the client gains access.

46
New cards

what does wi-fi protected setup (wps) simplify?

simplifies the process of connecting a mobile device (like a smartphone or tablet) to a wi-fi network.

47
New cards

how can a mobile device connect to a wi-fi network using wps?

pin configured on access point must be entered on the mobile device.

push a button on the access point.

near-field communication (nfc): bring the mobile device close to the access point.

48
New cards

what does a captive portal serve as?

serves as a gateway to a network.

49
New cards

what does a captive portal ensure?

ensures only validated users can access the network.

50
New cards

what must the end user do to gain access through a captive portal?

  • end user must put in their username and password to gain access to the business venue’s wireless network.

51
New cards

what does channel overlays refer to?

refers to the co-existence of multiple wireless networks operating on overlapping channels.

52
New cards

when does channel overlay occur?

occurs when multiple client devices and access points (APs) share the same channel.

53
New cards

what is a wireless controller?

is a specialized networking device or application that manages wireless network access points (APs).

54
New cards

what does a wireless controller manage?

manages system configuration and performance of wireless access points.

55
New cards

how should you secure wireless controllers?

control access to the management console, use strong encryption with HTTPS, and enable automatic logout after no activity.

56
New cards

how should you secure access points?

use strong passwords and update to the latest firmware.