4.3 Part 1 Networking+

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Geofencing is the creation of the virtual geographic boundary. This boundary can be combined with software to trigger an event when a device enters or leaves an area. What technology can be used to define geographic boundaries?

GPS

What is TKIP's function in securing wireless networks?

When configured to use WPA, TKIP enhances the RC4 cipher by adding complexity to the algorithm.

What wireless security protocol replaces WPA?

Wi-Fi Protected Access 2

What is the default authentication setting on older Access Points (APs)?

Open authentication

Which wireless encryption protocol was created to address the shortcomings of WEP?

WPA

Which authentication method is considered shared or group authentication?

WPA-PSK

Extensible Authentication Protocol (EAP) is an authentication framework. It specifies secure key distribution methods for mutual authentication. It is used in Wireless Networks in conjunction with WPA/WPA2. Which EAP standard is the most recent standard that was developed by Cisco ONLY?

EAP-FAST

Extensible Authentication Protocol (EAP) is an authentication framework. It specifies secure key distribution methods for mutual authentication. It is used in Wireless Networks in conjunction with WPA/WPA2. Which EAP implementation did the IETF develop?

EAP-TLS

Which authentication mechanism limits the devices allowed to connect to an AP by the devices' physical addresses?

MAC address filtering

Extensible Authentication Protocol (EAP) is an authentication framework. It specifies secure key distribution methods for mutual authentication. It is used in Wireless Networks in conjunction with WPA/WPA2. Which version of EAP is a joint effort between Cisco, RSA, and Microsoft?

Protected EAP (PEAP)

What attack does the use of CCMP-AES prevent in wireless networks?

Replay attacks

What is the difference between shared authentication and open authentication?

Shared authentication is the use of a Pre-Shared Key to authenticate a user. Open authentication is the null authentication of a user as long as the user knows the SSID.

Which encryption protocol and encryption algorithm combination does WPA use?

TKIP-RC4

Which protocols are used for integrity checking in wireless networks and what wireless standards are they used in?

Temporary Key Integrity Protocol (TKIP) is used in WPA to perform integrity checks. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is used in WPA2 to perform integrity checks.

An administrator is setting up a new SOHO wireless router for a small business. The administrator wants the users to authenticate via 802.1x. Which wireless encryption standard would the administrator deploy and why?

The administrator would use Wi-Fi Protection Access 2 (WPA2) Enterprise. WPA2 Enterprise enables the administrator to set up authentication via a centralized RADIUS server.

A user wants to limit the allowed devices on a wireless router to three devices. Which security control should the user implement?

The user should implement MAC filtering and list the three systems as allowed.

What is the difference between WPA2 Enterprise mode and WPA2 Personal mode?

WPA2 Enterprise mode uses a centralized authentication server for users. WPA2 Personal mode uses a Pre-Shared Key to authenticate users.

A user is configuring a SOHO wireless router for initial home use. What wireless encryption protocol should the user enable for maximum security?

WPA2 Personal

What encryption standards are used in wireless networks and what wireless standard are they used in?

WPA2 uses AES for encryption. WEP and WPA use RC4 for encryption.


Ensembles d'études connexes

chapter 16--lymphatic system and immunity

View Set

HESI Patient Review: Terry Johnson

View Set

MedSurg PrepU Ch 35 Assessment of Musculoskeletal Function

View Set

Chapter 10 - Cell and Tissue organization

View Set

STUDY chapter 4) Variable products

View Set