Which of the following is an weak implementation of EAP A EA

Which of the following is an weak implementation of EAP?

A. EAP-FAST

B. LEAP

C. PEAP

D. EAP-TLS

Solution

ans.B

------------------------------------------------------------------------------------------------------------------------------------------------------

-->LEAP offers mutual autherntication instead of a one-way authentication between supplicant and AS.
-->This elimintates the MITM attacks by rogue APs.
-->IT is vulnerable to dictionary attacks,because it mainly relies on MS-CHAPv2.
-->Theoretically LEAP is secure if complex enough passwords
are used .
-->By complex enough, we mean it is computationally infeasible to attempt an offline dictionary or
brute force attck.
-->An attacker now can crack the majority of enterprise WLAN that running LEAP ina few minutes without
any detection since the attack is passive and offline.
--> dictionary attack to LEAP is likely to occur, theimpact is high, and the risk is critical. Considering this risk, Cisco recommends users
move to other EAP methods, such as EAP-FAST, EAP-TLS or EAP-PEAP, to mitigate
the dictionary attack

Which of the following is an weak implementation of EAP? A. EAP-FAST B. LEAP C. PEAP D. EAP-TLSSolutionans.B ---------------------------------------------------

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site