Exam 8: Secure Wireless Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ measures the resources a user consumes during each network session.

(Multiple Choice)
4.8/5
(36)

Certificates are issued by a trusted third party called a(n) ____________________.

(Short Answer)
4.9/5
(48)

The MKs are used for access point to wireless device transmissions, or unicast transmissions.

(True/False)
4.8/5
(42)

In public key cryptography, the ____ key encrypts the message.

(Multiple Choice)
4.9/5
(33)

What are the steps for creating a pairwise master key (PMK)?

(Essay)
4.8/5
(30)

____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.

(Multiple Choice)
5.0/5
(40)

What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?

(Essay)
4.8/5
(30)

The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.

(Multiple Choice)
5.0/5
(37)

Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.

(True/False)
4.8/5
(39)

The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.

(Short Answer)
4.8/5
(38)

EAP was originally defined for dial-up access but is now used for both wired and wireless access.

(True/False)
4.8/5
(36)

What are the primary differences between LDAP and DAP?

(Essay)
4.9/5
(41)

What are the two types of device authentication supported by the IEEE 802.11 standard?

(Essay)
4.8/5
(26)

When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.

(Multiple Choice)
4.9/5
(36)

A ____ is a database stored on the network that contains information about users and network devices.

(Multiple Choice)
4.8/5
(40)

What is authentication for a wired network?

(Essay)
4.8/5
(30)

Briefly describe the functions of a RADIUS client and a RADIUS server.

(Essay)
4.7/5
(34)

The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.

(Multiple Choice)
4.8/5
(32)

Several of the EAP protocols use ____, which creates a ciphertext from cleartext.

(Multiple Choice)
4.8/5
(39)

LDAP was developed by Microsoft and the University of Michigan in 1996.

(True/False)
4.8/5
(33)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)