Exam 5: Wireless Security Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In 802.1x, the supplicant sends the request to a(n) ____ that serves as an intermediary device.

(Multiple Choice)
4.9/5
(32)

In 802.1x, the ____ is the wireless device that requires secure network access.

(Multiple Choice)
4.9/5
(29)

____ uses dynamic negotiation of authentication and encryption algorithms between access points and wireless devices.

(Multiple Choice)
4.8/5
(39)

What are the TKIP major components?

(Essay)
4.8/5
(30)

What are some of the limitations of MAC address filtering?

(Essay)
4.8/5
(34)

An 802.1x ____ only job is to verify the authentication of devices.

(Multiple Choice)
4.8/5
(30)

AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.

(Short Answer)
4.7/5
(42)

What are some of the reasons why turning off SSID beaconing provides a limited degree of security?

(Essay)
4.8/5
(37)

The ____ standard addresses the two weaknesses of wireless networks: encryption and authentication.

(Multiple Choice)
4.7/5
(35)

What are the steps involved in the 802.1x authentication procedure?

(Essay)
4.9/5
(36)

When should you use the transitional security model?

(Essay)
4.9/5
(38)

When using the transitional security model, open system authentication should be used instead of shared key authentication.

(True/False)
4.9/5
(31)

PSK keys are automatically authenticated between devices after a specified period known as the ____.

(Multiple Choice)
4.8/5
(35)

PSK requires that a key (also called a(n) ____) be entered in both the access point and the wireless devices.

(Multiple Choice)
4.8/5
(30)
Match each item with an statement below:
allows a company to maintain user profiles in a central database that all remote servers can share.
Personal security model
subset of 802.11i that addresses both encryption and authentication.
Block cipher
allows a device to become authenticated to an AP before moving into range of the AP.
Pre-authentication
Correct Answer:
Verified
Premises:
Responses:
allows a company to maintain user profiles in a central database that all remote servers can share.
Personal security model
subset of 802.11i that addresses both encryption and authentication.
Block cipher
allows a device to become authenticated to an AP before moving into range of the AP.
Pre-authentication
second generation of WPA security.
AES-CCMP
encryption protocol in the 802.11i standard.
DHCP
"leases" IP addresses to clients to use while they are connected to the network.
RADIUS
manipulates an entire block of text at one time.
WPA
intended for settings in which an authentication server is unavailable.
WPA2
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Enterprise security model
(Matching)
4.9/5
(31)

The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.

(Multiple Choice)
4.9/5
(37)

What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?

(Essay)
4.8/5
(36)

AES is designed to be an encryption technique that is secure from attacks.

(True/False)
4.9/5
(30)

Briefly describe the history of AES.

(Essay)
4.8/5
(36)

The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)