Exam 8: Secure Wireless Authentication
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
The ____ is used by the EAP key exchanges to provide confidentiality.
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
A
____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.
Free
(Multiple Choice)
5.0/5
(33)
Correct Answer:
D
Identify the types of information typically included in a digital certificate.
Free
(Essay)
4.9/5
(40)
Correct Answer:
A certificate typically includes information pertaining to its owner and to the CA that issued it, such as:
* A serial number
* The holder's public key
* The name of the certification authority that issued the certificate
* The name of the holder and other identification information required to uniquely identify the holder, such as the URL of the Web server using the certificate or an e-mail address
* The start and stop date in which the certificate is valid
A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.
(Multiple Choice)
4.8/5
(28)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(34)
The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
(Short Answer)
4.8/5
(33)
____________________ is the process that determines whether the user has the authority to carry out certain tasks.
(Short Answer)
4.9/5
(37)
____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.
(Multiple Choice)
4.8/5
(38)
Entries in the DIB are arranged in a tree structure called the ____________________.
(Short Answer)
4.8/5
(41)
What are the advantages and disadvantages of distributed autonomous site deployment?
(Essay)
4.9/5
(26)
____ is an industry standard protocol specification that forwards username and password information to a centralized server.
(Multiple Choice)
4.9/5
(31)
The International Organization for Standardization (ISO) created a standard for directory services known as ____.
(Multiple Choice)
4.9/5
(32)
The purpose of the ____ handshake is to authenticate the GTK.
(Multiple Choice)
4.9/5
(43)
Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
(Essay)
4.8/5
(31)
With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.
(Multiple Choice)
4.8/5
(34)
____ uses the unique human characteristics of a person for authentication (something the user is).
(Multiple Choice)
5.0/5
(42)
Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)