Wireless Security
Defense against digital dark arts
Video link: https://youtu.be/Ug5DZcF2NvY
What are some of the weaknesses of the WEP scheme? Check all that apply.
You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure.
You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure.
You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure.
What symmetric encryption algorithm does WPA2 use?
Great work! WPA2 uses CCMP. This utilizes AES in counter mode, which turns a block cipher into a stream cipher.
How can you reduce the likelihood of WPS brute-force attacks? Check all that apply.
Exactly! Ideally, you should disable WPS entirely if you can. If you need to use it, then you should use a lockout period to block connection attempts after a number of incorrect ones.
Exactly! Ideally, you should disable WPS entirely if you can. If you need to use it, then you should use a lockout period to block connection attempts after a number of incorrect ones.
Select the most secure WiFi security configuration from below:
Exactly right! WPA2 Enterprise would offer the highest level of security for a WiFi network. It offers the best encryption options for protecting data from eavesdropping third parties, and does not suffer from the manageability or authentication issues that WPA2 Personal has with a shared key mechanism. WPA2 Enterprise used with TLS certificates for authentication is one of the best solutions available.
Comments