• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back
Select Features of Authentication.
For security purposes, it is better to authenticate the user rather than the device.
Authenticity of devices an users attmepting to access a wireless network should never be assumed.
Open system Authentication and shared key authentication are two popular methods.
MAC addresses and SSIDs can be used to authenticate devices.
A User should be able to log on and be authenticated only once per session.
Identify features of IEEE 802.1x.
Uses an authenticator port to block all traffic except EAP packets until authenticaion is verified.
Supports encryption Key management.
Is implemented by various vendirs in their 802.11 wireless APs
Provides a framework to authenticate user access to a protected network.
Identify characteristics of 802.1x at work with EAP and Radius
Uses the RADIUS server to verify the identity of the supplicant.
Uses EAPOL over WLANS
Uses an authenticator port to block all traffic except EAP packets until authentication is verified.
Supports multpile authentication methods, such as token cards and passwords.
Authenticates and controls traffic to a protected network.
Select the characteristics of security in business.
Physical and environmental security prevents illegal access and damage to an organization's premises and information.
Personnel security reduces risks due to human error, theft, fraud, and mishandling of resources.
Organizational security helps to maintain information and information processing facilities.
Asset classification and control provides a suitable scale of value for the assets in the organization.
A security policy gives management direction for implementing information security.
Identify the features of EAP.
Supports multiple authentication schemes.
Forms the main security measure in 802.1x
Common methods include EAP-MD5, LEAP, EAP-TLS, and EAP-TTLS
Widely independent of the transporting protocols and physical media.
IETF standard orginally designed for PPP.
MATCHING
Provides wireless networking at data rates of up to 54 Mbps. (A)
Covers a broad geographical area of up to several thousand miles. (B)
Provides personal bubble wireless networking. (C)
(A) WLAN
(B) WWAN
(C) WPAN
Which are features of wireless technology that are beneficial to business?
Easy configuration and reconfiguration of topologies.
Easy and quick addition of new users to the network.
Flexibility of network installation.
Low operational and maintenance costs.
Select the key features of hashing technology.
Used to generate trusted transactions and digital signatures.
Provides for data integrity.
Is quite process intensive.
Can be used to complement public key cryptography systems like RSA.
Virtually impossible to mathmatically reverse.
What are the responsibilites of PKI?
To ensure trust in electronic transactions.
To issue and revoke digital certificates.
To store and retrieve digital certificates.
To manage key lifecycles.
MATCHING
Privacy (A)
Security (B)
Trust (C)
(A) Concerns nondisclosure of personal information.
(B) Deals with authorized access to data.
(C) Involves rating the confidence you have in business.
Which are key features of asymmetrical encryption?
Usually, only smaller amounts of data are transmitted using this method.
Two different keys are used to encrypt and decrypt the message.
The public key is mathmatically related to the private key.
The private key must be kept secret, but the public key may be freely transmitted.
MATCHING
(A) Security Assistant
(B) Privacy
(C) Trust
(D) Authentication
(E) Integrity
(F) Cryptography
(G) AVailability
(A) Creation of unidirectional logic connection for security purposes.
(B) Non-disclosure of sensitive information to a third party.
(C) Granting of business importance to an authenticated user.
(D) Obtains the proof of identoty declared by a user.
(E) Reliability of stored and transmitted data.
(F) Concealment of stored or transmitted information
(G_ Ensures uninterupted access to the network
Encryption:
Employs block or stream ciphers to encrypt tesxt.
protects data by converting plaintext to cipher text
Should be consideredwhen transmitting sensitive information across an unsecured channel.
Can be symettrical or asymmetrical.
Select the ky features of symmetrical encryption:
Symmetrical encryption can be made more secure bi ncreasing the number of cycles in the encryption process.
The more secure the encryption, the slower the program speed.
Systemetrical encryption uses the same key to encode and encrypt data.
MATCHING
Radiua (A)
Kerberos(B)
(C)TACAS+
(A) Combines, authentication and authorization.
Uses KDC as trusted entity.
(C) Uses START, REPLY, and CONTINUE packets.
Select the Characteristics of 802.1x at work with EAP and RADIUS.
Supports session key distribution
Facilitates authentication by enabling the use of EAPOL
Uses and authenticator to foward acceptance or rejection to the supplicant port.
Provides a standard for encapsulating EAP messages over 802.1x wireless networks
Uses a RADIUS server to authenticate the supplicant's identity
Select the features of EAP
Forms the main security measure in 802.1x
Widely independent of the transporting protocols or physical media.
Implements EAP state machine in the EAP layer.
CAn support token cards, Kerberos, public keys, and certificates.
Specified as EAPOL for LANs and EAPOW for WLANS.
Select the features of IEEE 802.1X
Provides a method for encapsulating EAP messages over wireless networks.
Is implemented by various vendors in their 802.11 wireless APs
Provides a framework to authenticate user access to protected network.
Facilitates authentication by enabling the use of EAP in LAN and WLAN media.
MATCHING

Privacy (A)
Availability (B)
Integrity (C)
Confidentiality (D)
Accountability (E)
Authorization (F)
Authentication (G)
(A) Non-disclosure of sensitive information to a third party.
(B) ensures uninterupted access to network
(C) Reliability of stored and trnamistted data.
(D) Ensures information is only accessible to persons with sufficient security.
(E) Validates transactions over the network
(F) Grants privleges on the server to access resources.
(G) obtains the proof of identity declared by a user.
Select the Key features of asymmetrical encryption
The private key must be kept secret, but the public key may be freely transmitted.
The public key is mathmatically related to the private key.
Two different keys are used to encrypt and decrypt the message.
Only smaller messages are generally transmitted using this method because processing time can be high.
Which are characteristics of security in business?
Business continuity managnement provides a disaster recovery plan to prevent interupptions to business activities.
Communications and operations management provide accurate and protected datat proceesing facilities.
Compliance to standards helps to prevent infringement of any criminal or civil law.
Access control helps to detec illegal computer access and unauthorized activities.
Systems development and maintenance protects the confidentiality, availability and integrity of information.
Which are key features of encryption?
Techniques becoming more complex due to increasing security needs.
Protects data by converting plaintext to ciphertext.
Can be symmetrical or asymmetrical.
Employs block or stream ciphers to encrypt text.
Which are features of authentication.
For security purposes, it is better to authenticate the user rather than the device.
Authenticity of devices and users attempting to access a wireless network should never be assumed.
Authentication verifies the identity of users or physical devices accessing the network.
A User should be able to log on and be authenticated only once per session.
The 802.11i standard will authenticate using 802.1x and EAP.
MATCHING

TACAS+ (A)
RADIUS (B)
Kerberos (C)
(A) Uses REQUEST packets
(B) Uses Access packets
(C) Uses TGT and session key
Select the features of wireless technology that are benficial to business.
Scalability of network with the changing needs of the organization.
Flexibility of adding users to the network.
Long-term financial gains to the organization.
User mobility.
MATCHING

WPAN (A)
WLAN (B)
WWAN (C)
(A) Provides personal bubble wireless networking
(B) Provides wireless networking at data rates of up to 54 Mbps
(C) Covers a broad geographical area of up to several thousand miles.
MATCHING

Involves rating the confidence you have in business associates (A)
Concerns nondisclosure of personal information (B)
Deals with authorized access to data (C)
(A) Trust
(B) Privacy
(C) Security
Which are key features of hashing technology?
Examples of hashing algorithms are MD5 and SHA
Used to generate trusted transactions and digital signatures
Provides a method of verifying integrity of transmitted data
Virtually impossible to mathematically reverse
Digital signature standards are specified in FIPS-186