Deck 9: Implementing Wireless Lan Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 9: Implementing Wireless Lan Security
1
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
True
2
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.
A) an access control list
B) port security
C) port scanning
D) port blocking
A) an access control list
B) port security
C) port scanning
D) port blocking
B
3
The block cipher used in 802.11i is the Data Encryption Standard (DES).
False
4
How long is the per-packet key used in TKIP?
A) 40-bits
B) 64-bits
C) 128-bits
D) 256-bits
A) 40-bits
B) 64-bits
C) 128-bits
D) 256-bits
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.
A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ wireless security standard provides a low level of security.
A) Dynamic WEP
B) WEP
C) WEP2
D) All of the above
A) Dynamic WEP
B) WEP
C) WEP2
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
What authentication system did the proposed WEP2 standard use?
A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.
A) 13
B) 15
C) 17
D) 19
A) 13
B) 15
C) 17
D) 19
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
What security technology was most recently introduced?
A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ replaces CRC in WPA.
A) MIC
B) MRC
C) CMR
D) CMC
A) MIC
B) MRC
C) CMR
D) CMC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?
A) key caching
B) port security
C) pre-authentication
D) message passing
A) key caching
B) port security
C) pre-authentication
D) message passing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The personal security model is intended for settings in which a(n) ____ is unavailable.
A) wired network
B) authentication server
C) AP
D) intermediate security model
A) wired network
B) authentication server
C) AP
D) intermediate security model
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The 802.11i standard addresses both ____.
A) encryption and confidentiality
B) integrity and confidentiality
C) authentication and direction
D) encryption and authentication
A) encryption and confidentiality
B) integrity and confidentiality
C) authentication and direction
D) encryption and authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.
A) broadcast
B) unicast
C) passphrase
D) ticket
A) broadcast
B) unicast
C) passphrase
D) ticket
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ method of encryption is used in a personal security model.
A) PSK
B) WEP
C) TKIP
D) MAC
A) PSK
B) WEP
C) TKIP
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.
A) ASCII
B) ciphered
C) hexadecimal
D) plaintext
A) ASCII
B) ciphered
C) hexadecimal
D) plaintext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
What is the first step in implementing an interim security model?
A) shared key authentication
B) port security
C) turning off SSID beaconing
D) MAC address filtering
A) shared key authentication
B) port security
C) turning off SSID beaconing
D) MAC address filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe Advanced Encryption Standard (AES).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Describe pre-shared key authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ is considered to be the "heart and soul" of WPA security.
A) PSK
B) IV
C) MIC
D) TKIP
A) PSK
B) IV
C) MIC
D) TKIP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.
A) captive portals
B) VPNs
C) firewalls
D) wireless sensors
A) captive portals
B) VPNs
C) firewalls
D) wireless sensors
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What should a business do if the best possible security model cannot be implemented?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ VPN is a user-to-LAN connection used by remote users.
A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ authentication is used in the enterprise security model using WPA and WPA2.
A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Describe Kerberos.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.
A) TKIP
B) AES
C) PSK
D) CBC
A) TKIP
B) AES
C) PSK
D) CBC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The ____________________ security model is designed for single users or small office home office (SOHO) settings of generally 10 or fewer wireless devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is the name of the 128-bit key used in TKIP?
A) temporal key
B) MIC
C) XOR
D) PRNG
A) temporal key
B) MIC
C) XOR
D) PRNG
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the 802.1x authentication procedure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What is a wireless gateway?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the ways in which captive portals are used?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck