CompTIA A+ 220-1202 - 2.3 Wireless Encryption and Authentication

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:18 PM on 2/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

Securing Wireless Networks

Authenticate the users before granting access to an organization's wireless network. Encrypt wireless communication.

2
New cards

Wireless Encryption

Computers are encrypted with a special encryption in which only people with the right key and transmit and listen over the wireless network.

3
New cards

WiFi Protected Access (WPA)

Replacement for Wired Equivalent Privacy which uses TKIP, Message Integrity Check (MIC), and RC4 encryption.

4
New cards

WiFi Protected Access 2 (WPA2)

Used Advanced Encryption Standard that is a stronger encryption method than TKIP in WPA. Requires more CPU usage than TKIP.

5
New cards

WiFi Protected Access 3 (WPA3)

a newer cryptographic protocol that is designed to be more secure than WPA2. Provides encryption even on open networks.

6
New cards

Wireless Security Modes

Configure the authentication on your wireless access point.

7
New cards

Pre-Shared Key (PSK)

A password that allows users to connect to a wireless network.

8
New cards

802.1X

Authentication mode that requires users to login with their credentials and an access point uses a centralized database to confirm the user.

9
New cards

Authentication Process

Client sends a login request to VPN concentrator, VPN concentrator send request to authentication server, authentication server sends approval to VPN concentrator, VPN concentrator provides access to internal file server.

10
New cards

Authentication Authorization and Accounting (AAA)

A set of protocols that provides a framework to allow secure access and authorization as well as keep track of the user's activities on a computer network, including wireless networks.

11
New cards

Remote Authentication Dial-In User Service (RADIUS)

A protocol that is stored on a centralized authentication server for users.

12
New cards

Terminal Access Control Access Control System (TACACS)

An early form of authentication protocol that was created to control access to dial-up lines to early forms of the internet.

13
New cards

TACACS+

The latest version of TACACS that provides additional authentication capabilities and response codes. Commonly a Cisco device

14
New cards

Kerberos authentication

Network authentication protocol that allows the user to authenticate once, and the user is trusted by the system for a timeframe. Commonly a microsoft network

15
New cards

Authentication Communication

Communication is determined by what is at hand. VPN concentrator can only communicate to a specific authentication server on its network.

16
New cards

multifactor authentication (MFA)

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories.