Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Name some weaknesses of WEP |
1.) Cannot Prevent Man-in-the-Middle attacks 2.) RC4 PRNG Improperly implented 3.) Reuse of IV keys |
|
What is a secuity enhancement introduces by WEP2 |
Kerberos |
|
Synamic WEP uses rotating |
keys |
|
Name a temporary security model for small/home office |
WPA Personal |
|
____functions as a "wrapper" arounf WEP by adding an addtional layer of security but still perserving WEP's basic functionality in WPA |
TKIP |
|
What replaces the Cyclic Redundancy Check (CRC) funtion in WEP in WPA |
Message integrity Check (MIC) |
|
Name 3 weaknesses of preshard key (PSK) |
1.)It can be difficult to manage mutiple devices 2.) Weak keys could be used 3.) The key must be kept secret |
|
Another name for the Robust Security Network (RSN) is |
IEEE 802.11i |
|
What is true about the Advanced Encryption Standard (AES) |
1.) It is used with the counter mode with Cipher Clock Chaining Message Code Protocol (CCMP) in WPA2 2.) It performs multiple iterations on the block of text 3.) One of its options is to use 128-bit key length |
|
Authentication for the IEEE 802.11i/WPA2 Enterprise model is archieved by using |
IEEE 802.1X |
|
In a RADIUS authenication with a wireless device in an IEEE 802.1X network, The AP serves as the |
Authenticator |
|
Name 3 Extensible Authenication Protocol (EAP) used in IEEE 802.1X |
1.) EAP-TLS 2.) PEAPv0/EAP-MSCHAPv2 3.) EAP-FAST |
|
What security models has lowest level security |
WPA Personal |
|
What IDS monitoring technique compares network traffic, activity, and transactions against those of known attacks |
signature-based monitoring |
|
What WIDs sensors uses existing APs to monitor the RF |
Integrated sensors |
|
Name 3 labels used to tag an AP by a sensor |
1.) authorized AP 2.) monitored AP 3.) known AP |
|
What is true regarding a Virtual Private Network (VPN) |
VPN requirs the use of special hardware for the client |
|
Name 3 options that can be used as secure device management technology |
1.) Hypertext Transport Protocol over Secure Sockets Layers (HTTPS) 2.) Secure Shell 2 (SSH2) 3.) Simple Network Management Protocol (SNMP) v3 |
|
_____is optional means of configuring security designed to help users who have little or no knowledge of security to quickly and easily implement it on their WLANs |
Wi-Fi Protected Setup (WPS) |
|
Name 3 Types of wireless probes that can be used to detact a rogue AP |
1.) wireless device probe 2.) desktop probe 3.) dedicated probe |