Deck 28: Securing Wireless Networks

Full screen (f)
exit full mode
Question
Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?

A) MIC
B) KIP
C) OAuth
D) EAP
Use Space or
up arrow
down arrow
to flip the card.
Question
The original 802.11 standard offered which of the following authentication methods? (Select all that apply.)

A) WPA2
B) LEAP
C) WEP
D) Open Authentication
Question
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?

A) Blowfish
B) HMAC
C) AES
D) RC4
Question
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?

A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol
Question
In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following?

A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection
Question
Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant?

A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP
Question
Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server?

A) EAP-FAST
B) EAP
C) PEAP
D) LEAP
Question
One disadvantage of EAP-TLS is which of the following?

A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.
Question
Which authentication method is considered the most secure wireless authentication method currently available?

A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS
Question
Which WPA version has encryption and MIC with AES and GCMP?

A) WPA
B) WPA2
C) WPA3
D) WPA4
Question
Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)?

A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.
Question
Which one of the following is the data encryption and integrity method used by WPA2?

A) CCMP
B) GCMP
C) TKIP
D) WIPS
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/12
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 28: Securing Wireless Networks
1
Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?

A) MIC
B) KIP
C) OAuth
D) EAP
MIC
2
The original 802.11 standard offered which of the following authentication methods? (Select all that apply.)

A) WPA2
B) LEAP
C) WEP
D) Open Authentication
WEP
Open Authentication
3
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?

A) Blowfish
B) HMAC
C) AES
D) RC4
RC4
4
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?

A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
5
In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following?

A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant?

A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
7
Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server?

A) EAP-FAST
B) EAP
C) PEAP
D) LEAP
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
8
One disadvantage of EAP-TLS is which of the following?

A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
9
Which authentication method is considered the most secure wireless authentication method currently available?

A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
10
Which WPA version has encryption and MIC with AES and GCMP?

A) WPA
B) WPA2
C) WPA3
D) WPA4
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
11
Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)?

A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
12
Which one of the following is the data encryption and integrity method used by WPA2?

A) CCMP
B) GCMP
C) TKIP
D) WIPS
Unlock Deck
Unlock for access to all 12 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 12 flashcards in this deck.