Deck 9: Implementing Wireless Lan Security

Full screen (f)
exit full mode
Question
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
Use Space or
up arrow
down arrow
to flip the card.
Question
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.

A) an access control list
B) port security
C) port scanning
D) port blocking
Question
The block cipher used in 802.11i is the Data Encryption Standard (DES).
Question
How long is the per-packet key used in TKIP?

A) 40-bits
B) 64-bits
C) 128-bits
D) 256-bits
Question
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
Question
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.

A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
Question
The ____ wireless security standard provides a low level of security.

A) Dynamic WEP
B) WEP
C) WEP2
D) All of the above
Question
What authentication system did the proposed WEP2 standard use?

A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
Question
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
Question
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.

A) 13
B) 15
C) 17
D) 19
Question
What security technology was most recently introduced?

A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
Question
____ replaces CRC in WPA.

A) MIC
B) MRC
C) CMR
D) CMC
Question
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

A) key caching
B) port security
C) pre-authentication
D) message passing
Question
The personal security model is intended for settings in which a(n) ____ is unavailable.

A) wired network
B) authentication server
C) AP
D) intermediate security model
Question
The 802.11i standard addresses both ____.

A) encryption and confidentiality
B) integrity and confidentiality
C) authentication and direction
D) encryption and authentication
Question
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.

A) broadcast
B) unicast
C) passphrase
D) ticket
Question
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Question
The ____ method of encryption is used in a personal security model.

A) PSK
B) WEP
C) TKIP
D) MAC
Question
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.

A) ASCII
B) ciphered
C) hexadecimal
D) plaintext
Question
What is the first step in implementing an interim security model?

A) shared key authentication
B) port security
C) turning off SSID beaconing
D) MAC address filtering
Question
Describe Advanced Encryption Standard (AES).
Question
Describe pre-shared key authentication.
Question
____ is considered to be the "heart and soul" of WPA security.

A) PSK
B) IV
C) MIC
D) TKIP
Question
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.

A) captive portals
B) VPNs
C) firewalls
D) wireless sensors
Question
The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.
Question
What should a business do if the best possible security model cannot be implemented?
Question
Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
Question
A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
Question
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
Question
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
Question
____ authentication is used in the enterprise security model using WPA and WPA2.

A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
Question
Describe Kerberos.
Question
Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.

A) TKIP
B) AES
C) PSK
D) CBC
Question
The ____________________ security model is designed for single users or small office home office (SOHO) settings of generally 10 or fewer wireless devices.
Question
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
Question
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
Question
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
Question
What is the name of the 128-bit key used in TKIP?

A) temporal key
B) MIC
C) XOR
D) PRNG
Question
Describe the 802.1x authentication procedure.
Question
What is a wireless gateway?
Question
What are the ways in which captive portals are used?
Question
Match between columns
wireless device that requires secure network access
key caching
wireless device that requires secure network access
802.11i
wireless device that requires secure network access
Message Integrity Check
wireless device that requires secure network access
dynamic
wireless device that requires secure network access
AES-CCMP
wireless device that requires secure network access
pre-shared key authentication
wireless device that requires secure network access
broadcast
wireless device that requires secure network access
Advanced Encryption Standard
wireless device that requires secure network access
supplicant
uses a passphrase that is manually entered to generate the encryption key
key caching
uses a passphrase that is manually entered to generate the encryption key
802.11i
uses a passphrase that is manually entered to generate the encryption key
Message Integrity Check
uses a passphrase that is manually entered to generate the encryption key
dynamic
uses a passphrase that is manually entered to generate the encryption key
AES-CCMP
uses a passphrase that is manually entered to generate the encryption key
pre-shared key authentication
uses a passphrase that is manually entered to generate the encryption key
broadcast
uses a passphrase that is manually entered to generate the encryption key
Advanced Encryption Standard
uses a passphrase that is manually entered to generate the encryption key
supplicant
performs three steps on every block (128 bits) of plaintext
key caching
performs three steps on every block (128 bits) of plaintext
802.11i
performs three steps on every block (128 bits) of plaintext
Message Integrity Check
performs three steps on every block (128 bits) of plaintext
dynamic
performs three steps on every block (128 bits) of plaintext
AES-CCMP
performs three steps on every block (128 bits) of plaintext
pre-shared key authentication
performs three steps on every block (128 bits) of plaintext
broadcast
performs three steps on every block (128 bits) of plaintext
Advanced Encryption Standard
performs three steps on every block (128 bits) of plaintext
supplicant
traffic sent to all users on the network
key caching
traffic sent to all users on the network
802.11i
traffic sent to all users on the network
Message Integrity Check
traffic sent to all users on the network
dynamic
traffic sent to all users on the network
AES-CCMP
traffic sent to all users on the network
pre-shared key authentication
traffic sent to all users on the network
broadcast
traffic sent to all users on the network
Advanced Encryption Standard
traffic sent to all users on the network
supplicant
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
key caching
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
802.11i
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Message Integrity Check
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
dynamic
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
AES-CCMP
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
pre-shared key authentication
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
broadcast
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Advanced Encryption Standard
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
supplicant
encryption protocol in the 802.11i standard
key caching
encryption protocol in the 802.11i standard
802.11i
encryption protocol in the 802.11i standard
Message Integrity Check
encryption protocol in the 802.11i standard
dynamic
encryption protocol in the 802.11i standard
AES-CCMP
encryption protocol in the 802.11i standard
pre-shared key authentication
encryption protocol in the 802.11i standard
broadcast
encryption protocol in the 802.11i standard
Advanced Encryption Standard
encryption protocol in the 802.11i standard
supplicant
solves the weak IV problem by rotating the keys frequently
key caching
solves the weak IV problem by rotating the keys frequently
802.11i
solves the weak IV problem by rotating the keys frequently
Message Integrity Check
solves the weak IV problem by rotating the keys frequently
dynamic
solves the weak IV problem by rotating the keys frequently
AES-CCMP
solves the weak IV problem by rotating the keys frequently
pre-shared key authentication
solves the weak IV problem by rotating the keys frequently
broadcast
solves the weak IV problem by rotating the keys frequently
Advanced Encryption Standard
solves the weak IV problem by rotating the keys frequently
supplicant
robust security network
key caching
robust security network
802.11i
robust security network
Message Integrity Check
robust security network
dynamic
robust security network
AES-CCMP
robust security network
pre-shared key authentication
robust security network
broadcast
robust security network
Advanced Encryption Standard
robust security network
supplicant
designed to prevent an attacker from capturing, altering, and resending data packets
key caching
designed to prevent an attacker from capturing, altering, and resending data packets
802.11i
designed to prevent an attacker from capturing, altering, and resending data packets
Message Integrity Check
designed to prevent an attacker from capturing, altering, and resending data packets
dynamic
designed to prevent an attacker from capturing, altering, and resending data packets
AES-CCMP
designed to prevent an attacker from capturing, altering, and resending data packets
pre-shared key authentication
designed to prevent an attacker from capturing, altering, and resending data packets
broadcast
designed to prevent an attacker from capturing, altering, and resending data packets
Advanced Encryption Standard
designed to prevent an attacker from capturing, altering, and resending data packets
supplicant
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Implementing Wireless Lan Security
1
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
True
2
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.

A) an access control list
B) port security
C) port scanning
D) port blocking
B
3
The block cipher used in 802.11i is the Data Encryption Standard (DES).
False
4
How long is the per-packet key used in TKIP?

A) 40-bits
B) 64-bits
C) 128-bits
D) 256-bits
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.

A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ wireless security standard provides a low level of security.

A) Dynamic WEP
B) WEP
C) WEP2
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
What authentication system did the proposed WEP2 standard use?

A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.

A) 13
B) 15
C) 17
D) 19
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
What security technology was most recently introduced?

A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ replaces CRC in WPA.

A) MIC
B) MRC
C) CMR
D) CMC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

A) key caching
B) port security
C) pre-authentication
D) message passing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The personal security model is intended for settings in which a(n) ____ is unavailable.

A) wired network
B) authentication server
C) AP
D) intermediate security model
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The 802.11i standard addresses both ____.

A) encryption and confidentiality
B) integrity and confidentiality
C) authentication and direction
D) encryption and authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.

A) broadcast
B) unicast
C) passphrase
D) ticket
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ method of encryption is used in a personal security model.

A) PSK
B) WEP
C) TKIP
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.

A) ASCII
B) ciphered
C) hexadecimal
D) plaintext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
What is the first step in implementing an interim security model?

A) shared key authentication
B) port security
C) turning off SSID beaconing
D) MAC address filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe Advanced Encryption Standard (AES).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Describe pre-shared key authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ is considered to be the "heart and soul" of WPA security.

A) PSK
B) IV
C) MIC
D) TKIP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.

A) captive portals
B) VPNs
C) firewalls
D) wireless sensors
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What should a business do if the best possible security model cannot be implemented?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ authentication is used in the enterprise security model using WPA and WPA2.

A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Describe Kerberos.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.

A) TKIP
B) AES
C) PSK
D) CBC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The ____________________ security model is designed for single users or small office home office (SOHO) settings of generally 10 or fewer wireless devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is the name of the 128-bit key used in TKIP?

A) temporal key
B) MIC
C) XOR
D) PRNG
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the 802.1x authentication procedure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What is a wireless gateway?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the ways in which captive portals are used?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
wireless device that requires secure network access
key caching
wireless device that requires secure network access
802.11i
wireless device that requires secure network access
Message Integrity Check
wireless device that requires secure network access
dynamic
wireless device that requires secure network access
AES-CCMP
wireless device that requires secure network access
pre-shared key authentication
wireless device that requires secure network access
broadcast
wireless device that requires secure network access
Advanced Encryption Standard
wireless device that requires secure network access
supplicant
uses a passphrase that is manually entered to generate the encryption key
key caching
uses a passphrase that is manually entered to generate the encryption key
802.11i
uses a passphrase that is manually entered to generate the encryption key
Message Integrity Check
uses a passphrase that is manually entered to generate the encryption key
dynamic
uses a passphrase that is manually entered to generate the encryption key
AES-CCMP
uses a passphrase that is manually entered to generate the encryption key
pre-shared key authentication
uses a passphrase that is manually entered to generate the encryption key
broadcast
uses a passphrase that is manually entered to generate the encryption key
Advanced Encryption Standard
uses a passphrase that is manually entered to generate the encryption key
supplicant
performs three steps on every block (128 bits) of plaintext
key caching
performs three steps on every block (128 bits) of plaintext
802.11i
performs three steps on every block (128 bits) of plaintext
Message Integrity Check
performs three steps on every block (128 bits) of plaintext
dynamic
performs three steps on every block (128 bits) of plaintext
AES-CCMP
performs three steps on every block (128 bits) of plaintext
pre-shared key authentication
performs three steps on every block (128 bits) of plaintext
broadcast
performs three steps on every block (128 bits) of plaintext
Advanced Encryption Standard
performs three steps on every block (128 bits) of plaintext
supplicant
traffic sent to all users on the network
key caching
traffic sent to all users on the network
802.11i
traffic sent to all users on the network
Message Integrity Check
traffic sent to all users on the network
dynamic
traffic sent to all users on the network
AES-CCMP
traffic sent to all users on the network
pre-shared key authentication
traffic sent to all users on the network
broadcast
traffic sent to all users on the network
Advanced Encryption Standard
traffic sent to all users on the network
supplicant
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
key caching
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
802.11i
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Message Integrity Check
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
dynamic
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
AES-CCMP
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
pre-shared key authentication
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
broadcast
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Advanced Encryption Standard
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
supplicant
encryption protocol in the 802.11i standard
key caching
encryption protocol in the 802.11i standard
802.11i
encryption protocol in the 802.11i standard
Message Integrity Check
encryption protocol in the 802.11i standard
dynamic
encryption protocol in the 802.11i standard
AES-CCMP
encryption protocol in the 802.11i standard
pre-shared key authentication
encryption protocol in the 802.11i standard
broadcast
encryption protocol in the 802.11i standard
Advanced Encryption Standard
encryption protocol in the 802.11i standard
supplicant
solves the weak IV problem by rotating the keys frequently
key caching
solves the weak IV problem by rotating the keys frequently
802.11i
solves the weak IV problem by rotating the keys frequently
Message Integrity Check
solves the weak IV problem by rotating the keys frequently
dynamic
solves the weak IV problem by rotating the keys frequently
AES-CCMP
solves the weak IV problem by rotating the keys frequently
pre-shared key authentication
solves the weak IV problem by rotating the keys frequently
broadcast
solves the weak IV problem by rotating the keys frequently
Advanced Encryption Standard
solves the weak IV problem by rotating the keys frequently
supplicant
robust security network
key caching
robust security network
802.11i
robust security network
Message Integrity Check
robust security network
dynamic
robust security network
AES-CCMP
robust security network
pre-shared key authentication
robust security network
broadcast
robust security network
Advanced Encryption Standard
robust security network
supplicant
designed to prevent an attacker from capturing, altering, and resending data packets
key caching
designed to prevent an attacker from capturing, altering, and resending data packets
802.11i
designed to prevent an attacker from capturing, altering, and resending data packets
Message Integrity Check
designed to prevent an attacker from capturing, altering, and resending data packets
dynamic
designed to prevent an attacker from capturing, altering, and resending data packets
AES-CCMP
designed to prevent an attacker from capturing, altering, and resending data packets
pre-shared key authentication
designed to prevent an attacker from capturing, altering, and resending data packets
broadcast
designed to prevent an attacker from capturing, altering, and resending data packets
Advanced Encryption Standard
designed to prevent an attacker from capturing, altering, and resending data packets
supplicant
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.