• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Name some weaknesses of WEP

1.) Cannot Prevent Man-in-the-Middle attacks


2.) RC4 PRNG Improperly implented


3.) Reuse of IV keys

What is a secuity enhancement introduces by WEP2

Kerberos

Synamic WEP uses rotating

keys

Name a temporary security model for small/home office

WPA Personal

____functions as a "wrapper" arounf WEP by adding an addtional layer of security but still perserving WEP's basic functionality in WPA

TKIP

What replaces the Cyclic Redundancy Check (CRC) funtion in WEP in WPA

Message integrity Check (MIC)

Name 3 weaknesses of preshard key (PSK)

1.)It can be difficult to manage mutiple devices


2.) Weak keys could be used


3.) The key must be kept secret

Another name for the Robust Security Network (RSN) is

IEEE 802.11i

What is true about the Advanced Encryption Standard (AES)

1.) It is used with the counter mode with Cipher Clock Chaining Message Code Protocol (CCMP) in WPA2


2.) It performs multiple iterations on the block of text


3.) One of its options is to use 128-bit key length

Authentication for the IEEE 802.11i/WPA2 Enterprise model is archieved by using

IEEE 802.1X

In a RADIUS authenication with a wireless device in an IEEE 802.1X network, The AP serves as the

Authenticator

Name 3 Extensible Authenication Protocol (EAP) used in IEEE 802.1X

1.) EAP-TLS


2.) PEAPv0/EAP-MSCHAPv2


3.) EAP-FAST

What security models has lowest level security

WPA Personal

What IDS monitoring technique compares network traffic, activity, and transactions against those of known attacks

signature-based monitoring

What WIDs sensors uses existing APs to monitor the RF

Integrated sensors

Name 3 labels used to tag an AP by a sensor

1.) authorized AP


2.) monitored AP


3.) known AP

What is true regarding a Virtual Private Network (VPN)

VPN requirs the use of special hardware for the client

Name 3 options that can be used as secure device management technology

1.) Hypertext Transport Protocol over Secure Sockets Layers (HTTPS)


2.) Secure Shell 2 (SSH2)


3.) Simple Network Management Protocol (SNMP) v3

_____is optional means of configuring security designed to help users who have little or no knowledge of security to quickly and easily implement it on their WLANs

Wi-Fi Protected Setup (WPS)

Name 3 Types of wireless probes that can be used to detact a rogue AP

1.) wireless device probe


2.) desktop probe


3.) dedicated probe