Deck 5: Wireless Security Models
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 5: Wireless Security Models
1
Unlike WEP the PSK is not used for encryption but instead serves as the starting point (____) for mathematically generating the encryption keys.
A) seed
B) per-packet key
C) MIC
D) CRC
A) seed
B) per-packet key
C) MIC
D) CRC
A
2
It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES.
True
3
AES is designed to be an encryption technique that is secure from attacks.
True
4
In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.
A) per-packet
B) temporal
C) CRC
D) TKIP
A) per-packet
B) temporal
C) CRC
D) TKIP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.
A) 802.1a
B) 802.1g
C) 802.1x
D) 802.1z
A) 802.1a
B) 802.1g
C) 802.1x
D) 802.1z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.
A) pre-authentication
B) port security
C) MIC
D) key-caching
A) pre-authentication
B) port security
C) MIC
D) key-caching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
PSK keys are automatically authenticated between devices after a specified period known as the ____.
A) MIC interval
B) IV interval
C) rekey interval
D) CRC interval
A) MIC interval
B) IV interval
C) rekey interval
D) CRC interval
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Pre-authentication allows for faster roaming between access points.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
PSK passphrases of fewer than 20 characters can be subject to ____ attacks.
A) DDoS
B) QoS
C) offline dictionary
D) DoS
A) DDoS
B) QoS
C) offline dictionary
D) DoS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
An 802.1x ____ only job is to verify the authentication of devices.
A) wireless gateway
B) port security
C) authentication server
D) WNIC
A) wireless gateway
B) port security
C) authentication server
D) WNIC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ standard addresses the two weaknesses of wireless networks: encryption and authentication.
A) 802.3
B) 802.11i
C) AES
D) RC4
A) 802.3
B) 802.11i
C) AES
D) RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
When using the transitional security model, open system authentication should be used instead of shared key authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
PSK keys are automatically changed (called ____).
A) MIC
B) key mixing
C) IV sequence
D) rekeying
A) MIC
B) key mixing
C) IV sequence
D) rekeying
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.
A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys
A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.
A) personal security
B) enterprise security
C) SOHO security
D) transitional security
A) personal security
B) enterprise security
C) SOHO security
D) transitional security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.
A) block cipher
B) chain cipher
C) text cipher
D) CRC cipher
A) block cipher
B) chain cipher
C) text cipher
D) CRC cipher
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ model is designed for single users or small office/home office (SOHO) settings of generally 10 or fewer wireless devices.
A) enterprise security
B) personal security
C) transitional security
D) temporal security
A) enterprise security
B) personal security
C) transitional security
D) temporal security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
A) AES
B) RC4
C) Block cipher
D) Port security
A) AES
B) RC4
C) Block cipher
D) Port security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
TKIP keys are known as ____ keys.
A) per-packet
B) CRC
C) MIC
D) MAC
A) per-packet
B) CRC
C) MIC
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In 802.1x, the supplicant sends the request to a(n) ____ that serves as an intermediary device.
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ uses dynamic negotiation of authentication and encryption algorithms between access points and wireless devices.
A) RSN
B) WPA
C) WPA2
D) 802.1i
A) RSN
B) WPA
C) WPA2
D) 802.1i
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
In 802.1x, the ____ is the wireless device that requires secure network access.
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The block cipher used in 802.11i is the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are some of the limitations of MAC address filtering?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Briefly describe the history of AES.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The original PSK passphrase is mathematically manipulated (known as ____________________) 4,096 times before it is transmitted.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
What are the benefits of limiting the maximum number of DHCP users?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
When should you use the transitional security model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
PSK requires that a key (also called a(n) ____) be entered in both the access point and the wireless devices.
A) shared secret
B) MIC key
C) mixed key
D) interval key
A) shared secret
B) MIC key
C) mixed key
D) interval key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are the steps involved in the 802.1x authentication procedure?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
WPA replaces WEP with an encryption technology called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What are some of the PSK key management weaknesses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are some of the reasons why turning off SSID beaconing provides a limited degree of security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The most robust level of security that can be achieved today for wireless LANs is using the ____ model.
A) personal security
B) transitional security
C) temporal security
D) enterprise security
A) personal security
B) transitional security
C) temporal security
D) enterprise security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the TKIP major components?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
How do TKIP and MIC perform encryption in the WPA personal security model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck