1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a process of protecting a wireless network from attackers who attempt to collect sensitive information by breaching the RF traffic?
Wireless encryption
What is an IEEE amendment that specifies security mechanisms for 802.11 wireless networks?
802.11i
What is an encryption algorithm for IEEE 802.11 wireless networks? It is an old wireless security standard and can be cracked easily.
WEP (Wired Equivalent Privacy)
What supports multiple authentication methods, such as token cards, Kerberos, and certificates?
EAP (Extensible Authentication Protocol)
What is a proprietary version of EAP developed by Cisco?
LEAP (Lightweight Extensible Authentication Protocol)
What is an advanced wireless encryption protocol using TKIP and Message Integrity Check (MIC) to provide strong encryption and authentication? It uses a 48-bit initialization vector (IV), 32-bit cyclic redundancy check (CRC), and TKIP encryption for wireless security.
WPA (Wi-Fi Protected Access)
What is a security protocol used in WPA as a replacement for WEP?
TKIP (Temporal Key Integrity Protocol)
What is an upgrade to WPA using AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption?
WPA2
What is a symmetric-key encryption used in WPA2 as a replacement for TKIP?
AES (Advanced Encryption Standard)
What is an encryption protocol used in WPA2 for strong encryption and authentication?
CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol)
What integrates EAP (Extensible Authentication Protocol) standards with WPA2 encryption?
WPA2 Enterprise
What is a centralized authentication and authorization management system?
RADIUS (Remote Authentication Dial-In User Service)
What is a protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel?
PEAP (Protected Extensible Authentication Protocol)
What uses Galois/Counter Mode-256 (GCMP-256) for encryption and the 384-bit hash message authentication code with the Secure Hash Algorithm (HMAC-SHA-384) for authentication for personal and enterprise usage?
WPA3
What is a security protocol defined by the 802.11b standard; it was designed to provide a wireless LAN with a level of security and privacy comparable to that of a wired LAN?
WEP (Wired Equivalent Privacy)
What uses a 24-bit initialization vector (IV) to form stream cipher RC4 (Rivest Cipher) for confidentiality and the CRC-32 checksum for integrity of wireless transmissions?
WEP (Wired Equivalent Privacy)
What has significant vulnerabilities and design flaws and can therefore be easily cracked?
WEP (Wired Equivalent Privacy)
What are the main advantages of WEP?
Confidentiality: It prevents link-layer eavesdropping, Access Control: It determines who may access data, Data Integrity: It protects the change of data by a third party and Efficiency
What are the flaws of WEP?
No defined method for encryption key distribution, RC4 was designed to be used in a more randomized environment than that utilized by WEP (the same key is used repeatedly and has plaintext), Attackers analyze the traffic from passive data captures and crack WEP keys with the help of tools such as Fern Wifi Cracker and WEP-key-break and Key scheduling algorithms are also vulnerable to attack.
What is a security protocol defined by 802.11i standards; it uses a Temporal Key Integrity Protocol (TKIP) that utilizes the RC4 stream cipher encryption with 128-bit keys and 64-bit MIC integrity check to provide stronger encryption and authentication?
WPA (Wi-Fi Protected Access)
What uses TKIP (Temporal Key Integrity Protocol) to eliminate the weaknesses of WEP by including per-packet mixing functions, message integrity checks, extended initialization vectors, and re-keying mechanisms?
WPA (Wi-Fi Protected Access)
What includes mandatory support for counter mode with cipher block chaining message authentication code protocol (CCMP), an AES-based encryption mode with strong security?
WPA2
What It uses a set-up password (pre-shared Key, PSK) to protect unauthorized network accesses and In PSK mode, each wireless network device encrypts the network traffic using a 128-bit key, which is derived from a passphrase of 8 to 63 ASCII characters?
WPA2-Personal
What includes EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, and Kerberos?
WPA2-Enterprise
What provides trailblazing protocols and uses the AES-GCMP 256 encryption algorithm?
WPA3
What is mainly used to deliver password-based authentication using the SAE (Simultaneous Authentication of Equals) protocol, also known as Dragonfly Key Exchange?
WPA3-Personal
What protects sensitive data using many cryptographic algorithms, provides authenticated encryption using GCMP-256 (Galois/Counter Mode Protection), uses HMAC-SHA-384 (Hash-based Message Authentication Code) to generate cryptographic keys, and uses ECDSA-384 (Elliptic Curve Digital Signature Algorithm) for exchanging keys?
WPA3-Enterprise
What are the modes of operation for WPA3-Personal?
Resistance to offline dictionary attacks (brute-forcing), Resistance to key recovery, Natural password choice, and Easy accessibility
Name one of the eight issues with WEP (Wired Equivalent Privacy)
CRC-32 does not ensure complete cryptographic integrity
Name one of the eight issues with WEP (Wired Equivalent Privacy)
IVs are 24 bits and sent in cleartext
Name one of the eight issues with WEP (Wired Equivalent Privacy)
Vulnerable to known plaintext attacks
Name one of the eight issues with WEP (Wired Equivalent Privacy)
Prone to password cracking attacks
Name one of the eight issues with WEP (Wired Equivalent Privacy)
Associate/disassociate messages are not authenticated
Name one of the eight issues with WEP (Wired Equivalent Privacy)
One can easily construct a decryption table of reconstructed key streams
Name one of the eight issues with WEP (Wired Equivalent Privacy)
Lack of centralized key management
Name one of the eight issues with WEP (Wired Equivalent Privacy)
IV is a part of the RC4 encryption key, which leads to an analytical attack
Name one of the five issues with WPA (Wi-Fi Protected Access)
Pre-shared key is vulnerable to eavesdropping and dictionary attacks
Name one of the five issues with WPA (Wi-Fi Protected Access)
Lack of forward secrecy
Name one of the five issues with WPA (Wi-Fi Protected Access)
WPA-TKIP is vulnerable to packet spoofing and decryption attacks
Name one of the five issues with WPA (Wi-Fi Protected Access)
Insecure random number generator (RNG) in WPA allows the discover of GTK generated by AP
Name one of the five issues with WPA (Wi-Fi Protected Access)
Vulnerabilities in TKIP allow attackers to guess the IP address of the subnet
Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)
Pre-shared key is vulnerable to eavesdropping and dictionary attacks
Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)
Lack of forward secrecy
Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)
Hole96 vulnerability makes WPA2 vulnerable to MITM and DoS attacks
Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)
Insecure random number generator (RNG) in WPA2 allow attackers to discover GTK generated by AP
Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)
KRACK vulnerabilities make WPA2 vulnerable to packet sniffing, connection hijacking, malware injection, and decryption attacks
Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)
WPA3 uses more complex encryption algorithms, which can demand more processing power from devices
Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)
Simultaneous Authentication of Equals (SAE) vulnerable to timing attacks
Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)
Vulnerable to cache-based side-channel attacks, exposing sensitive information from cache access patterns
Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)
Errors in configuration such as weak passwords and poor network setup, can leave networks vulnerable to intrusion, despite the advanced protections offered by WPA3