Notes in Day 57 Flashcards - Wireless Security

To Subscribe, use this Key


Status Last Update Fields
Published 03/05/2024 A [...] is used by a wireless AP to encrypt traffic that it wants to send to all of its clients.
Published 03/05/2024 What does MIC stand for?
Published 03/05/2024 What does WEP stand for?
Published 03/05/2024 What does EAP stand for?
Published 03/05/2024 What does LEAP stand for?
Published 03/05/2024 What does EAP-FAST stand for?
Published 03/05/2024 What does PEAP stand for?
Published 03/05/2024 What does EAP-TLS stand for?
Published 03/05/2024 When using [...] authentication, all authentication requests are accepted.
Published 03/05/2024 WEP uses the [...] algorithm for encryption.
Published 03/05/2024 WEP keys can be [...] or [...] in length.
Published 03/05/2024 EAP is integrated with [...], which provides port-based network access control.
Published 03/05/2024 Which 802.1X entity?The device that wants to connect to the network.
Published 03/05/2024 Which 802.1X entity?The device that provides access to the network.
Published 03/05/2024 Which 802.1X entity?The device that receives client credentials and permits/denies access.
Published 03/05/2024 LEAP provides mutual authentication by exchanging [...]
Published 03/05/2024 LEAP uses [...] WEP keys that change frequently.
Published 03/05/2024 In EAP-FAST, a [...] is passed from the server to the client.
Published 03/05/2024 Three phases of EAP-FAST:1: [...]2: Secure TLS tunnel is established3: Client is authenticated via the TLS tunnel
Published 03/05/2024 Three phases of EAP-FAST:1: PAC is passed from server to client2: [...]3: Client is authenticated via the TLS tunnel
Published 03/05/2024 Three phases of EAP-FAST:1: PAC is passed from server to client2: Secure TLS tunnel is established3: [...]
Published 03/05/2024 In PEAP, the server is authenticated via a [...].
Published 03/05/2024 What does MS-CHAP stand for?
Published 03/05/2024 In PEAP, which device/devices require a certificate?
Published 03/05/2024 In EAP-TLS, which device/devices require a certificate?
Published 03/05/2024 What does TKIP stand for?
Published 03/05/2024 What does CCMP stand for?
Published 03/05/2024 What does GCMP stand for?
Published 03/05/2024 Which encryption protocol was developed as an improvement upon WEP?
Published 03/05/2024 What does CCMP use for encryption?
Published 03/05/2024 What does CCMP use as a MIC?
Published 03/05/2024 What does CBC-MAC stand for?
Published 03/05/2024 What does GCMP use for encryption?
Published 03/05/2024 What does GCMP use for MIC?
Published 03/05/2024 What does GMAC stand for?
Published 03/05/2024 What are the two WPA authentication modes?
Published 03/05/2024 Which WPA authentication mode uses a PSK?
Published 03/05/2024 Which WPA authentication mode uses 802.1X/EAP?
Published 03/05/2024 WPA uses [...] for encryption/MIC.
Published 03/05/2024 WPA2 uses [...] for encryption/MIC.
Published 03/05/2024 WPA3 uses [...] for encryption/MIC.
Published 03/05/2024 WPA3 [...] protects the four-way handshake when using personal mode authentication.
Published 03/05/2024 WPA3 [...] prevents data from being decrypted after it has been transmitted over the air.
Status Last Update Fields