Deck 5: Wireless Security Models

Full screen (f)
exit full mode
Question
Unlike WEP the PSK is not used for encryption but instead serves as the starting point (____) for mathematically generating the encryption keys.

A) seed
B) per-packet key
C) MIC
D) CRC
Use Space or
up arrow
down arrow
to flip the card.
Question
It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES.
Question
AES is designed to be an encryption technique that is secure from attacks.
Question
In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.

A) per-packet
B) temporal
C) CRC
D) TKIP
Question
IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.

A) 802.1a
B) 802.1g
C) 802.1x
D) 802.1z
Question
IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.

A) pre-authentication
B) port security
C) MIC
D) key-caching
Question
PSK keys are automatically authenticated between devices after a specified period known as the ____.

A) MIC interval
B) IV interval
C) rekey interval
D) CRC interval
Question
Pre-authentication allows for faster roaming between access points.
Question
PSK passphrases of fewer than 20 characters can be subject to ____ attacks.

A) DDoS
B) QoS
C) offline dictionary
D) DoS
Question
An 802.1x ____ only job is to verify the authentication of devices.

A) wireless gateway
B) port security
C) authentication server
D) WNIC
Question
The ____ standard addresses the two weaknesses of wireless networks: encryption and authentication.

A) 802.3
B) 802.11i
C) AES
D) RC4
Question
When using the transitional security model, open system authentication should be used instead of shared key authentication.
Question
PSK keys are automatically changed (called ____).

A) MIC
B) key mixing
C) IV sequence
D) rekeying
Question
WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.

A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys
Question
The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.

A) personal security
B) enterprise security
C) SOHO security
D) transitional security
Question
Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.

A) block cipher
B) chain cipher
C) text cipher
D) CRC cipher
Question
The ____ model is designed for single users or small office/home office (SOHO) settings of generally 10 or fewer wireless devices.

A) enterprise security
B) personal security
C) transitional security
D) temporal security
Question
WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.
Question
____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.

A) AES
B) RC4
C) Block cipher
D) Port security
Question
TKIP keys are known as ____ keys.

A) per-packet
B) CRC
C) MIC
D) MAC
Question
In 802.1x, the supplicant sends the request to a(n) ____ that serves as an intermediary device.

A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Question
AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.
Question
____ uses dynamic negotiation of authentication and encryption algorithms between access points and wireless devices.

A) RSN
B) WPA
C) WPA2
D) 802.1i
Question
In 802.1x, the ____ is the wireless device that requires secure network access.

A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Question
The block cipher used in 802.11i is the ____________________.
Question
What are some of the limitations of MAC address filtering?
Question
The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Question
Briefly describe the history of AES.
Question
The original PSK passphrase is mathematically manipulated (known as ____________________) 4,096 times before it is transmitted.
Question
What are the benefits of limiting the maximum number of DHCP users?
Question
When should you use the transitional security model?
Question
PSK requires that a key (also called a(n) ____) be entered in both the access point and the wireless devices.

A) shared secret
B) MIC key
C) mixed key
D) interval key
Question
What are the steps involved in the 802.1x authentication procedure?
Question
WPA replaces WEP with an encryption technology called ____________________.
Question
WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.
Question
What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
Question
What are some of the PSK key management weaknesses?
Question
What are some of the reasons why turning off SSID beaconing provides a limited degree of security?
Question
The most robust level of security that can be achieved today for wireless LANs is using the ____ model.

A) personal security
B) transitional security
C) temporal security
D) enterprise security
Question
What are the TKIP major components?
Question
How do TKIP and MIC perform encryption in the WPA personal security model?
Question
Match between columns
allows a company to maintain user profiles in a central database that all remote servers can share.
Pre-authentication
allows a company to maintain user profiles in a central database that all remote servers can share.
Personal security model
allows a company to maintain user profiles in a central database that all remote servers can share.
AES-CCMP
allows a company to maintain user profiles in a central database that all remote servers can share.
RADIUS
allows a company to maintain user profiles in a central database that all remote servers can share.
WPA
allows a company to maintain user profiles in a central database that all remote servers can share.
Enterprise security model
allows a company to maintain user profiles in a central database that all remote servers can share.
DHCP
allows a company to maintain user profiles in a central database that all remote servers can share.
WPA2
allows a company to maintain user profiles in a central database that all remote servers can share.
Block cipher
subset of 802.11i that addresses both encryption and authentication.
Pre-authentication
subset of 802.11i that addresses both encryption and authentication.
Personal security model
subset of 802.11i that addresses both encryption and authentication.
AES-CCMP
subset of 802.11i that addresses both encryption and authentication.
RADIUS
subset of 802.11i that addresses both encryption and authentication.
WPA
subset of 802.11i that addresses both encryption and authentication.
Enterprise security model
subset of 802.11i that addresses both encryption and authentication.
DHCP
subset of 802.11i that addresses both encryption and authentication.
WPA2
subset of 802.11i that addresses both encryption and authentication.
Block cipher
allows a device to become authenticated to an AP before moving into range of the AP.
Pre-authentication
allows a device to become authenticated to an AP before moving into range of the AP.
Personal security model
allows a device to become authenticated to an AP before moving into range of the AP.
AES-CCMP
allows a device to become authenticated to an AP before moving into range of the AP.
RADIUS
allows a device to become authenticated to an AP before moving into range of the AP.
WPA
allows a device to become authenticated to an AP before moving into range of the AP.
Enterprise security model
allows a device to become authenticated to an AP before moving into range of the AP.
DHCP
allows a device to become authenticated to an AP before moving into range of the AP.
WPA2
allows a device to become authenticated to an AP before moving into range of the AP.
Block cipher
second generation of WPA security.
Pre-authentication
second generation of WPA security.
Personal security model
second generation of WPA security.
AES-CCMP
second generation of WPA security.
RADIUS
second generation of WPA security.
WPA
second generation of WPA security.
Enterprise security model
second generation of WPA security.
DHCP
second generation of WPA security.
WPA2
second generation of WPA security.
Block cipher
encryption protocol in the 802.11i standard.
Pre-authentication
encryption protocol in the 802.11i standard.
Personal security model
encryption protocol in the 802.11i standard.
AES-CCMP
encryption protocol in the 802.11i standard.
RADIUS
encryption protocol in the 802.11i standard.
WPA
encryption protocol in the 802.11i standard.
Enterprise security model
encryption protocol in the 802.11i standard.
DHCP
encryption protocol in the 802.11i standard.
WPA2
encryption protocol in the 802.11i standard.
Block cipher
"leases" IP addresses to clients to use while they are connected to the network.
Pre-authentication
"leases" IP addresses to clients to use while they are connected to the network.
Personal security model
"leases" IP addresses to clients to use while they are connected to the network.
AES-CCMP
"leases" IP addresses to clients to use while they are connected to the network.
RADIUS
"leases" IP addresses to clients to use while they are connected to the network.
WPA
"leases" IP addresses to clients to use while they are connected to the network.
Enterprise security model
"leases" IP addresses to clients to use while they are connected to the network.
DHCP
"leases" IP addresses to clients to use while they are connected to the network.
WPA2
"leases" IP addresses to clients to use while they are connected to the network.
Block cipher
manipulates an entire block of text at one time.
Pre-authentication
manipulates an entire block of text at one time.
Personal security model
manipulates an entire block of text at one time.
AES-CCMP
manipulates an entire block of text at one time.
RADIUS
manipulates an entire block of text at one time.
WPA
manipulates an entire block of text at one time.
Enterprise security model
manipulates an entire block of text at one time.
DHCP
manipulates an entire block of text at one time.
WPA2
manipulates an entire block of text at one time.
Block cipher
intended for settings in which an authentication server is unavailable.
Pre-authentication
intended for settings in which an authentication server is unavailable.
Personal security model
intended for settings in which an authentication server is unavailable.
AES-CCMP
intended for settings in which an authentication server is unavailable.
RADIUS
intended for settings in which an authentication server is unavailable.
WPA
intended for settings in which an authentication server is unavailable.
Enterprise security model
intended for settings in which an authentication server is unavailable.
DHCP
intended for settings in which an authentication server is unavailable.
WPA2
intended for settings in which an authentication server is unavailable.
Block cipher
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Pre-authentication
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Personal security model
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
AES-CCMP
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
RADIUS
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
WPA
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Enterprise security model
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
DHCP
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
WPA2
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Block cipher
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Wireless Security Models
1
Unlike WEP the PSK is not used for encryption but instead serves as the starting point (____) for mathematically generating the encryption keys.

A) seed
B) per-packet key
C) MIC
D) CRC
A
2
It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES.
True
3
AES is designed to be an encryption technique that is secure from attacks.
True
4
In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.

A) per-packet
B) temporal
C) CRC
D) TKIP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.

A) 802.1a
B) 802.1g
C) 802.1x
D) 802.1z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.

A) pre-authentication
B) port security
C) MIC
D) key-caching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
PSK keys are automatically authenticated between devices after a specified period known as the ____.

A) MIC interval
B) IV interval
C) rekey interval
D) CRC interval
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Pre-authentication allows for faster roaming between access points.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
PSK passphrases of fewer than 20 characters can be subject to ____ attacks.

A) DDoS
B) QoS
C) offline dictionary
D) DoS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
An 802.1x ____ only job is to verify the authentication of devices.

A) wireless gateway
B) port security
C) authentication server
D) WNIC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ standard addresses the two weaknesses of wireless networks: encryption and authentication.

A) 802.3
B) 802.11i
C) AES
D) RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
When using the transitional security model, open system authentication should be used instead of shared key authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
PSK keys are automatically changed (called ____).

A) MIC
B) key mixing
C) IV sequence
D) rekeying
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.

A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.

A) personal security
B) enterprise security
C) SOHO security
D) transitional security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.

A) block cipher
B) chain cipher
C) text cipher
D) CRC cipher
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ model is designed for single users or small office/home office (SOHO) settings of generally 10 or fewer wireless devices.

A) enterprise security
B) personal security
C) transitional security
D) temporal security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.

A) AES
B) RC4
C) Block cipher
D) Port security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
TKIP keys are known as ____ keys.

A) per-packet
B) CRC
C) MIC
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In 802.1x, the supplicant sends the request to a(n) ____ that serves as an intermediary device.

A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ uses dynamic negotiation of authentication and encryption algorithms between access points and wireless devices.

A) RSN
B) WPA
C) WPA2
D) 802.1i
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
In 802.1x, the ____ is the wireless device that requires secure network access.

A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The block cipher used in 802.11i is the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are some of the limitations of MAC address filtering?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Briefly describe the history of AES.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The original PSK passphrase is mathematically manipulated (known as ____________________) 4,096 times before it is transmitted.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
What are the benefits of limiting the maximum number of DHCP users?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
When should you use the transitional security model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
PSK requires that a key (also called a(n) ____) be entered in both the access point and the wireless devices.

A) shared secret
B) MIC key
C) mixed key
D) interval key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are the steps involved in the 802.1x authentication procedure?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
WPA replaces WEP with an encryption technology called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What are some of the PSK key management weaknesses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are some of the reasons why turning off SSID beaconing provides a limited degree of security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The most robust level of security that can be achieved today for wireless LANs is using the ____ model.

A) personal security
B) transitional security
C) temporal security
D) enterprise security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the TKIP major components?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
How do TKIP and MIC perform encryption in the WPA personal security model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
allows a company to maintain user profiles in a central database that all remote servers can share.
Pre-authentication
allows a company to maintain user profiles in a central database that all remote servers can share.
Personal security model
allows a company to maintain user profiles in a central database that all remote servers can share.
AES-CCMP
allows a company to maintain user profiles in a central database that all remote servers can share.
RADIUS
allows a company to maintain user profiles in a central database that all remote servers can share.
WPA
allows a company to maintain user profiles in a central database that all remote servers can share.
Enterprise security model
allows a company to maintain user profiles in a central database that all remote servers can share.
DHCP
allows a company to maintain user profiles in a central database that all remote servers can share.
WPA2
allows a company to maintain user profiles in a central database that all remote servers can share.
Block cipher
subset of 802.11i that addresses both encryption and authentication.
Pre-authentication
subset of 802.11i that addresses both encryption and authentication.
Personal security model
subset of 802.11i that addresses both encryption and authentication.
AES-CCMP
subset of 802.11i that addresses both encryption and authentication.
RADIUS
subset of 802.11i that addresses both encryption and authentication.
WPA
subset of 802.11i that addresses both encryption and authentication.
Enterprise security model
subset of 802.11i that addresses both encryption and authentication.
DHCP
subset of 802.11i that addresses both encryption and authentication.
WPA2
subset of 802.11i that addresses both encryption and authentication.
Block cipher
allows a device to become authenticated to an AP before moving into range of the AP.
Pre-authentication
allows a device to become authenticated to an AP before moving into range of the AP.
Personal security model
allows a device to become authenticated to an AP before moving into range of the AP.
AES-CCMP
allows a device to become authenticated to an AP before moving into range of the AP.
RADIUS
allows a device to become authenticated to an AP before moving into range of the AP.
WPA
allows a device to become authenticated to an AP before moving into range of the AP.
Enterprise security model
allows a device to become authenticated to an AP before moving into range of the AP.
DHCP
allows a device to become authenticated to an AP before moving into range of the AP.
WPA2
allows a device to become authenticated to an AP before moving into range of the AP.
Block cipher
second generation of WPA security.
Pre-authentication
second generation of WPA security.
Personal security model
second generation of WPA security.
AES-CCMP
second generation of WPA security.
RADIUS
second generation of WPA security.
WPA
second generation of WPA security.
Enterprise security model
second generation of WPA security.
DHCP
second generation of WPA security.
WPA2
second generation of WPA security.
Block cipher
encryption protocol in the 802.11i standard.
Pre-authentication
encryption protocol in the 802.11i standard.
Personal security model
encryption protocol in the 802.11i standard.
AES-CCMP
encryption protocol in the 802.11i standard.
RADIUS
encryption protocol in the 802.11i standard.
WPA
encryption protocol in the 802.11i standard.
Enterprise security model
encryption protocol in the 802.11i standard.
DHCP
encryption protocol in the 802.11i standard.
WPA2
encryption protocol in the 802.11i standard.
Block cipher
"leases" IP addresses to clients to use while they are connected to the network.
Pre-authentication
"leases" IP addresses to clients to use while they are connected to the network.
Personal security model
"leases" IP addresses to clients to use while they are connected to the network.
AES-CCMP
"leases" IP addresses to clients to use while they are connected to the network.
RADIUS
"leases" IP addresses to clients to use while they are connected to the network.
WPA
"leases" IP addresses to clients to use while they are connected to the network.
Enterprise security model
"leases" IP addresses to clients to use while they are connected to the network.
DHCP
"leases" IP addresses to clients to use while they are connected to the network.
WPA2
"leases" IP addresses to clients to use while they are connected to the network.
Block cipher
manipulates an entire block of text at one time.
Pre-authentication
manipulates an entire block of text at one time.
Personal security model
manipulates an entire block of text at one time.
AES-CCMP
manipulates an entire block of text at one time.
RADIUS
manipulates an entire block of text at one time.
WPA
manipulates an entire block of text at one time.
Enterprise security model
manipulates an entire block of text at one time.
DHCP
manipulates an entire block of text at one time.
WPA2
manipulates an entire block of text at one time.
Block cipher
intended for settings in which an authentication server is unavailable.
Pre-authentication
intended for settings in which an authentication server is unavailable.
Personal security model
intended for settings in which an authentication server is unavailable.
AES-CCMP
intended for settings in which an authentication server is unavailable.
RADIUS
intended for settings in which an authentication server is unavailable.
WPA
intended for settings in which an authentication server is unavailable.
Enterprise security model
intended for settings in which an authentication server is unavailable.
DHCP
intended for settings in which an authentication server is unavailable.
WPA2
intended for settings in which an authentication server is unavailable.
Block cipher
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Pre-authentication
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Personal security model
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
AES-CCMP
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
RADIUS
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
WPA
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Enterprise security model
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
DHCP
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
WPA2
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Block cipher
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.