Deck 8: Secure Wireless Authentication
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 8: Secure Wireless Authentication
1
The system of using digital certificates,CAs,and other registration authorities that verify and authenticate the validity of each party involved in a transaction over a public network is known as ____.
A) AAA server
B) AAA infrastructure
C) public cryptography
D) public key infrastructure (PKI)
A) AAA server
B) AAA infrastructure
C) public cryptography
D) public key infrastructure (PKI)
D
2
A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.
A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
A
3
____ measures the resources a user consumes during each network session.
A) Accounting
B) Authorization
C) Authentication
D) Integrity
A) Accounting
B) Authorization
C) Authentication
D) Integrity
A
4
LEAP is not vulnerable to dictionary attack tools.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.
A) DAP
B) DIB
C) DIT
D) DIU
A) DAP
B) DIB
C) DIT
D) DIU
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.
A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is an industry standard protocol specification that forwards username and password information to a centralized server.
A) Kerberos
B) TACACS+
C) PKI
D) Asymmetric encryption
A) Kerberos
B) TACACS+
C) PKI
D) Asymmetric encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.
A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The MKs are used for access point to wireless device transmissions, or unicast transmissions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.
A) PAP
B) CHAP
C) MS-CHAP
D) EAP-MD5
A) PAP
B) CHAP
C) MS-CHAP
D) EAP-MD5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ uses the unique human characteristics of a person for authentication (something the user is).
A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.
A) Distributed autonomous sites
B) Distributed sites with centralized authentication and security
C) Single site
D) Distributed sites and security with centralized authentication
A) Distributed autonomous sites
B) Distributed sites with centralized authentication and security
C) Single site
D) Distributed sites and security with centralized authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
LDAP was developed by Microsoft and the University of Michigan in 1996.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
EAP was originally defined for dial-up access but is now used for both wired and wireless access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Several of the EAP protocols use ____, which creates a ciphertext from cleartext.
A) symmetric encryption
B) hashing
C) asymmetric encryption
D) filtering
A) symmetric encryption
B) hashing
C) asymmetric encryption
D) filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In public key cryptography, the ____ key encrypts the message.
A) public
B) private
C) known
D) user
A) public
B) private
C) known
D) user
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.
A) PAP
B) LEAP
C) EAP-TLS
D) EAP-MD5
A) PAP
B) LEAP
C) EAP-TLS
D) EAP-MD5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The International Organization for Standardization (ISO) created a standard for directory services known as ____.
A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A ____ is a database stored on the network that contains information about users and network devices.
A) PKI
B) biometric service
C) Kerberos service
D) directory service
A) PKI
B) biometric service
C) Kerberos service
D) directory service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The ____ is used by the EAP key exchanges to provide confidentiality.
A) KEK
B) KCK
C) WPAK
D) nonce key
A) KEK
B) KCK
C) WPAK
D) nonce key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The purpose of the ____ handshake is to authenticate the GTK.
A) group key
B) four-way
C) five-way
D) MK
A) group key
B) four-way
C) five-way
D) MK
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the primary differences between LDAP and DAP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the two types of device authentication supported by the IEEE 802.11 standard?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Entries in the DIB are arranged in a tree structure called the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.
A) WPA exchange
B) GK encryption
C) handshakes
D) MK exchange
A) WPA exchange
B) GK encryption
C) handshakes
D) MK exchange
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
How does Kerberos work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the process that determines whether the user has the authority to carry out certain tasks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The exchange of information for the MK is based on a ____.
A) group key handshake
B) PTK handshake
C) GTK encryption
D) four-way handshake
A) group key handshake
B) PTK handshake
C) GTK encryption
D) four-way handshake
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.
A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Identify the types of information typically included in a digital certificate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Briefly describe the functions of a RADIUS client and a RADIUS server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the advantages and disadvantages of distributed autonomous site deployment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Certificates are issued by a trusted third party called a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is authentication for a wired network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.
A) GTK
B) MK
C) PTK
D) PMK
A) GTK
B) MK
C) PTK
D) PMK
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the steps for creating a pairwise master key (PMK)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck