1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does WPA stand for?
Wi-Fi Protected Access.
Which encryption protocols are commonly used in WPA2/WPA3 networks?
TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard).
What was the purpose of TKIP?
To fix security flaws in WEP by providing a unique encryption key for each packet.
How does TKIP generate its encryption key?
Mixes a base key, the AP's MAC address, and a packet serial number; uses RC4 to encrypt packets.
Why is TKIP no longer recommended?
It is vulnerable to attacks and not considered secure.
What is AES and why is it preferred?
AES is a strong encryption protocol using 128-bit blocks and keys up to 256 bits; paired with CCMP for secure wireless communication.
What does CCMP stand for?
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol.
What is RADIUS?
Remote Authentication Dial-In Service; an open-standard protocol for authentication using UDP.
Which ports does RADIUS use?
Port 1812 for authentication/authorization, port 1813 for accounting.
What is TACACS+ and who developed it?
A Cisco protocol similar to RADIUS, but encrypts all packets and uses TCP port 49; only on Cisco devices.
What do RADIUS and TACACS+ provide?
Authentication, Authorization, and Accounting (AAA).
What is Kerberos and who developed it?
An authentication protocol developed by MIT; default in Microsoft Windows since 2000 and used in Active Directory.
What are the three "heads" of Kerberos?
Client, authentication server, and key distribution center (KDC).
How does Kerberos authenticate a user?
Client sends credentials → authentication server → KDC → ticket-granting ticket → session ticket for network access.
What is a limitation of Kerberos?
It provides authentication only, not authorization or accounting.
Why is Kerberos often used alongside RADIUS or TACACS+?
To provide full AAA coverage and stronger security in enterprise environments.
Which encryption protocol should be used in modern wireless networks?
AES with CCMP.
Which authentication protocols are important for enterprise wireless networks?
RADIUS, TACACS+, and Kerberos.