4.1 Wireless Network Security Protocols and Authentication Flashcards

(17 cards)

1
Q

What are the three fundamental security goals for any wireless network?

A

The three fundamental security goals are encryption, authentication, and integrity.

Encryption ensures data sent over the air is unreadable to attackers, authentication allows only authorized users to access the network, and integrity guarantees that data is received exactly as it was sent without alteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary security vulnerability associated with the WPA2 protocol’s initial connection process?

A

The primary vulnerability in WPA2 is its four-way handshake, which allows an attacker to capture the pre-shared key hash and use brute-force techniques to discover the network’s pre-shared key.

Attacks can utilize GPU processing or cloud-based cracking methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the WPA3 protocol specifically prevent the type of brute-force attack that WPA2 is susceptible to?

A

WPA3 prevents this attack by replacing the four-way handshake with Simultaneous Authentication of Equals (SAE), which derives shared session keys on the end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is GCMP, and what two key security features does it provide for WPA3 networks?

A

GCMP stands for Galois Counter Mode Protocol. It provides:
* Data confidentiality through robust encryption
* A Message Integrity Check (MIC) via the Galois message authentication code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the difference between the WPA3-Personal and WPA3-Enterprise configurations.

A

WPA3-Personal is for home use with a shared pre-shared key, while WPA3-Enterprise uses centralized 802.1X authentication with unique credentials for each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three components of the AAA framework, and what is the function of each?

A

The three components are:
* Authentication: verifies a user’s identity
* Authorization: determines resource access
* Accounting: logs session metrics such as login times and data usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RADIUS, and what is the primary reason for its widespread use in network authentication?

A

RADIUS stands for Remote Authentication Dial-In User Service, and it is widely used due to its long-standing presence and support by numerous network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the 802.1X standard, also referred to as Network Access Control (NAC)?

A

The purpose of the 802.1X standard is to control access to a network by requiring valid credentials before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What role does the Extensible Authentication Protocol (EAP) play within the 802.1X process?

A

EAP provides a flexible structure for the authentication conversation within the 802.1X process, allowing customization to meet security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify and briefly describe the three distinct services or devices involved in the 802.1X authentication process.

A

The three services are:
* Supplicant: the client device trying to connect
* Authenticator: the network device (e.g., a wireless access point)
* Authentication server: the AAA server that validates the supplicant’s credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: The three components of the AAA framework are Authentication, _______, and Accounting.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: WPA3 uses the same four-way handshake as WPA2.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the alternative name for the Simultaneous Authentication of Equals (SAE) key exchange method implemented in WPA3?

A

Dragonfly Handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Accounting refer to in the context of the AAA framework?

A

Accounting is responsible for logging metrics associated with a user’s session, such as login/logout times and data transferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the term ‘Pre-Shared Key (PSK)’ refer to?

A

A single password or passphrase shared among all users to gain access to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main security improvement of WPA3 over WPA2?

A

WPA3 eliminates the four-way handshake and uses SAE for secure key exchange.

17
Q

What does the term ‘Message Integrity Check (MIC)’ mean?

A

A cryptographic check used to verify that a message has not been altered in transit.