Exam 9: Implementing Wireless Lan Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.

Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
Verified

C

Describe Advanced Encryption Standard (AES).

Free
(Essay)
4.7/5
(44)
Correct Answer:
Verified

AES is a block cipher that uses the same key for both encryption and decryption. With AES, bits are encrypted in blocks of plaintext that are calculated independently, rather than a keystream acting across a plaintext data input stream. AES has a block size of 128 bits with three possible key lengths: 128, 192, and 256 bits as specified in the AES standard. For the WPA2/802.11i implementation of AES, a 128-bit key length is used. AES encryption includes four stages that make up one round. Each round is then iterated 10, 12, or 14 times depending upon the bit-key size. For the WPA2/802.11i implementation of AES, each round is iterated 10 times.

The personal security model is intended for settings in which a(n) ____ is unavailable.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

What is the name of the 128-bit key used in TKIP?

(Multiple Choice)
4.9/5
(38)

Describe pre-shared key authentication.

(Essay)
4.8/5
(35)

Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).

(Essay)
4.8/5
(33)

In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.

(Essay)
4.9/5
(37)

____ was designed to address WEP vulnerabilities with a minimum of inconvenience.

(Multiple Choice)
4.8/5
(30)

The block cipher used in 802.11i is the Data Encryption Standard (DES).

(True/False)
4.8/5
(33)

WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.

(True/False)
4.7/5
(36)

____ authentication is used in the enterprise security model using WPA and WPA2.

(Multiple Choice)
4.9/5
(36)

A network supporting the 802.1x standard consists of three elements. Identify and describe each one.

(Essay)
4.8/5
(32)

Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.

(Short Answer)
4.8/5
(35)

In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.

(Multiple Choice)
4.8/5
(36)

What should a business do if the best possible security model cannot be implemented?

(Essay)
4.9/5
(36)

The ____ wireless security standard provides a low level of security.

(Multiple Choice)
4.7/5
(31)

Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.

(True/False)
4.9/5
(44)

At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.

(Multiple Choice)
4.8/5
(38)
Match each term with the correct statement below.
wireless device that requires secure network access
AES-CCMP
uses a passphrase that is manually entered to generate the encryption key
pre-shared key authentication
performs three steps on every block (128 bits) of plaintext
802.11i
Correct Answer:
Verified
Premises:
Responses:
wireless device that requires secure network access
AES-CCMP
uses a passphrase that is manually entered to generate the encryption key
pre-shared key authentication
performs three steps on every block (128 bits) of plaintext
802.11i
traffic sent to all users on the network
key caching
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Advanced Encryption Standard
encryption protocol in the 802.11i standard
broadcast
solves the weak IV problem by rotating the keys frequently
Message Integrity Check
robust security network
supplicant
designed to prevent an attacker from capturing, altering, and resending data packets
dynamic
(Matching)
4.9/5
(36)

____ is considered to be the "heart and soul" of WPA security.

(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)