Cisco Secure WLANs Quiz
16 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are two early security features used to keep wireless intruders out and protect data?

SSID Cloaking and MAC Address Filtering

What is the purpose of SSID Cloaking?

To disable the SSID beacon frame and require wireless clients to be manually configured with the SSID to connect to the network.

How does MAC Address Filtering work to control wireless access?

An administrator can manually permit or deny clients wireless access based on their physical MAC hardware address.

What is Open System Authentication and when is it typically used?

<p>It is an authentication method that does not require a password and is typically used to provide free internet access in public areas like cafes, airports, and hotels.</p> Signup and view all the answers

What are the four shared key authentication techniques available for securing WLANs?

<p>WEP, WPA, WPA2, WPA3</p> Signup and view all the answers

What encryption algorithm does WPA use to secure the data?

<p>Temporal Key Integrity Protocol (TKIP)</p> Signup and view all the answers

Which encryption protocol is used by WPA2?

<p>Advanced Encryption Standard (AES)</p> Signup and view all the answers

What are the two authentication methods available for WPA2 on home routers?

<p>Personal and Enterprise</p> Signup and view all the answers

What are the two encryption protocols included in WPA and WPA2?

<p>Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES)</p> Signup and view all the answers

What does the Enterprise security mode choice for authentication require?

<p>An Authentication, Authorization, and Accounting (AAA) RADIUS server</p> Signup and view all the answers

What is used to authenticate the AP with the RADIUS server in the Enterprise security mode?

<p>Shared key</p> Signup and view all the answers

What does WPA3 - Personal use to thwart brute force attacks?

<p>Simultaneous Authentication of Equals (SAE)</p> Signup and view all the answers

What does WPA3 - Enterprise use for authentication?

<p>802.1X/EAP</p> Signup and view all the answers

What does WPA3 - Open Networks use to encrypt all wireless traffic?

<p>Opportunistic Wireless Encryption (OWE)</p> Signup and view all the answers

What is used to quickly onboard IoT devices in WPA3?

<p>Device Provisioning Protocol (DPP)</p> Signup and view all the answers

What is the recommended security protocol when WPA2 is no longer considered secure?

<p>WPA3</p> Signup and view all the answers

More Like This

Connecting to Elevance Health Wireless Guest Networks
10 questions
Wireless Network Security Risks Quiz
5 questions
Wireless Network Security Risks
5 questions
Wireless Networks Securing Strategies
8 questions
Use Quizgecko on...
Browser
Browser