Deck 28: Securing Wireless Networks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/12
Play
Full screen (f)
Deck 28: Securing Wireless Networks
1
Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?
A) MIC
B) KIP
C) OAuth
D) EAP
A) MIC
B) KIP
C) OAuth
D) EAP
MIC
2
The original 802.11 standard offered which of the following authentication methods? (Select all that apply.)
A) WPA2
B) LEAP
C) WEP
D) Open Authentication
A) WPA2
B) LEAP
C) WEP
D) Open Authentication
WEP
Open Authentication
Open Authentication
3
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?
A) Blowfish
B) HMAC
C) AES
D) RC4
A) Blowfish
B) HMAC
C) AES
D) RC4
RC4
4
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?
A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol
A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
5
In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following?
A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection
A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant?
A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP
A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
7
Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server?
A) EAP-FAST
B) EAP
C) PEAP
D) LEAP
A) EAP-FAST
B) EAP
C) PEAP
D) LEAP
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
8
One disadvantage of EAP-TLS is which of the following?
A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.
A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
9
Which authentication method is considered the most secure wireless authentication method currently available?
A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS
A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
10
Which WPA version has encryption and MIC with AES and GCMP?
A) WPA
B) WPA2
C) WPA3
D) WPA4
A) WPA
B) WPA2
C) WPA3
D) WPA4
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
11
Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)?
A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.
A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
12
Which one of the following is the data encryption and integrity method used by WPA2?
A) CCMP
B) GCMP
C) TKIP
D) WIPS
A) CCMP
B) GCMP
C) TKIP
D) WIPS
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck