Exam 8: Secure Wireless Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ is used by the EAP key exchanges to provide confidentiality.

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

A

____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.

Free
(Multiple Choice)
5.0/5
(33)
Correct Answer:
Verified

D

Identify the types of information typically included in a digital certificate.

Free
(Essay)
4.9/5
(40)
Correct Answer:
Verified

A certificate typically includes information pertaining to its owner and to the CA that issued it, such as:
* A serial number
* The holder's public key
* The name of the certification authority that issued the certificate
* The name of the holder and other identification information required to uniquely identify the holder, such as the URL of the Web server using the certificate or an e-mail address
* The start and stop date in which the certificate is valid

A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

(Multiple Choice)
4.8/5
(28)
Match each item with an statement below:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Password
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
EAP
Microsoft implementation of CHAP.
MS-CHAP
Correct Answer:
Verified
Premises:
Responses:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Password
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
EAP
Microsoft implementation of CHAP.
MS-CHAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
PAP
a randomly chosen value.
Group master key (GMK)
handles some CA tasks such as processing certificate requests and authenticating users.
Digital certificates
management protocol that controls port-based authentication.
Nonce
starting point of the group key hierarchy.
Kerberos
authentication system developed by the Massachusetts Institute of Technology (MIT).
Registration authority (RA)
(Matching)
4.8/5
(34)

The exchange of information for the MK is based on a ____.

(Multiple Choice)
4.8/5
(39)

The ____________________ is used by the EAP key exchanges to provide data origin authenticity.

(Short Answer)
4.8/5
(33)

____________________ is the process that determines whether the user has the authority to carry out certain tasks.

(Short Answer)
4.9/5
(37)

____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.

(Multiple Choice)
4.8/5
(38)

Entries in the DIB are arranged in a tree structure called the ____________________.

(Short Answer)
4.8/5
(41)

What are the advantages and disadvantages of distributed autonomous site deployment?

(Essay)
4.9/5
(26)

____ is an industry standard protocol specification that forwards username and password information to a centralized server.

(Multiple Choice)
4.9/5
(31)

The International Organization for Standardization (ISO) created a standard for directory services known as ____.

(Multiple Choice)
4.9/5
(32)

The purpose of the ____ handshake is to authenticate the GTK.

(Multiple Choice)
4.9/5
(43)

LEAP is not vulnerable to dictionary attack tools.

(True/False)
4.7/5
(36)

How does Kerberos work?

(Essay)
4.9/5
(40)

Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).

(Essay)
4.8/5
(31)

With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

(Multiple Choice)
4.8/5
(34)

____ uses the unique human characteristics of a person for authentication (something the user is).

(Multiple Choice)
5.0/5
(42)

Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.

(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)