1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
what does wpa2 address?
vulnerabilities found in wep.
what encryption protocol does wpa2 use?
ccmp (counter mode with cbc-mac), which uses aes for strong data encryption.
what are the two methods combined in ccmp?
counter mode (for data privacy) and cbc-mac (for data tampering checks).
what does wpa3 offer compared to wpa2?
even stronger protection.
what encryption protocol does wpa3 use?
gcmp (galois/counter mode protocol).
what does gcmp provide for data?
confidentiality (encryption) and authenticity (integrity).
what are the two essential features of ccmp?
data confidentiality (encryption) and message authentication code (mac) for integrity.
what does data confidentiality (encryption) in ccmp protect?
the actual data.
what does the message authentication code (mac) in ccmp ensure?
that the data hasn’t been tampered with.
what does sae replace in WPA3?
the older pre-shared key (psk) method used in WPA2.
which key exchange method does sae rely on?
diffie-hellman key exchange.
what does sae include that enhances security?
mutual authentication.
what does eap provide in networks?
an authentication framework for various methods.
how does eap ensure user or device access?
by verifying their identity before granting access.
with which standard does eap work seamlessly?
802.1x, which is for port-based network access control.
what does tls ensure for communication?
secure communication by agreeing on cryptographic algorithms, verifying identities, and establishing session keys.
how does peap enhance authentication security?
by encapsulating eap within a secure tls tunnel.
what authentication method does peap use for users?
generic token card (gtc).
what role does the authentication server (as) play in peap?
it uses a digital certificate to ensure secure authentication.
do client devices need their own certificates in peap?
no, they do not.
how is user authentication performed in peap?
through mschapv2, verified against microsoft’s ms-chapv2 databases.
what is the purpose of eap-fast?
to provide secure authentication within wireless networks.
what is used as a shared secret in eap-fast?
a protected access credential (pac).
how does the supplicant receive the pac?
from the authentication server (as).
what role does the tls tunnel play in eap-fast?
it provides a secure channel for user authentication.
what role does the radius server play in eap-fast?
it provides the authentication database and eap-fast services.
what is the primary security feature of eap-tls?
robust security for user authentication.
what is required on both the authentication server and client devices in eap-tls?
digital certificates.
why is a public key infrastructure (pki) needed for eap-tls?
to manage and validate the certificates.
what must be deployed to all wireless clients in eap-tls?
certificates
how does eap-tls ensure secure communication?
by establishing a tls tunnel after mutual authentication.
what does eap-ttls allow to operate within a TLS tunnel?
other authentication protocols.
what does the TLS tunnel provide in eap-ttls?
a secure channel for authentication.
what are the certificate requirements for eap-ttls?
a digital certificate on the authentication server but not on every device.
what flexibility does eap-ttls offer in authentication methods?
any authentication method can be used within the TLS tunnel.
what does IEEE 802.1X ensure?
secure access to a network.
at what level does IEEE 802.1X operate?
port level (such as Ethernet switch ports or wireless access points).
what happens to a device until it successfully authenticates?
it is denied access to the network.
what must a device do to gain network access?
authenticate itself.
which access databases are used in conjunction with IEEE 802.1X?
RADIUS, LDAP, and TACACS+.
what does RADIUS Federation allow?
linking a user’s identity across multiple authentication systems.
what authentication methods are used in RADIUS Federation?
802.1X and EAP.
can members of one organization authenticate on another’s network?
yes, using their normal credentials.
where is pre-shared key (psk) authentication commonly used?
Commonly used in home networks and small businesses.
how does pre-shared key (PSK) authentication work?
the network administrator configures a shared secret (PSK) on both the access point (AP) and client devices.
when a client wants to connect, it provides the PSK during the initial handshake.
the AP verifies the PSK, and if it matches, the client gains access.
what does wi-fi protected setup (wps) simplify?
simplifies the process of connecting a mobile device (like a smartphone or tablet) to a wi-fi network.
how can a mobile device connect to a wi-fi network using wps?
pin configured on access point must be entered on the mobile device.
push a button on the access point.
near-field communication (nfc): bring the mobile device close to the access point.
what does a captive portal serve as?
serves as a gateway to a network.
what does a captive portal ensure?
ensures only validated users can access the network.
what must the end user do to gain access through a captive portal?
end user must put in their username and password to gain access to the business venue’s wireless network.
what does channel overlays refer to?
refers to the co-existence of multiple wireless networks operating on overlapping channels.
when does channel overlay occur?
occurs when multiple client devices and access points (APs) share the same channel.
what is a wireless controller?
is a specialized networking device or application that manages wireless network access points (APs).
what does a wireless controller manage?
manages system configuration and performance of wireless access points.
how should you secure wireless controllers?
control access to the management console, use strong encryption with HTTPS, and enable automatic logout after no activity.
how should you secure access points?
use strong passwords and update to the latest firmware.