1- Wireless WiFi Security Flashcards

1
Q

Protection of wireless WiFi Security

A

Enable MAC filtering and encryption

Disable SSID and DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enable Media Access control (MAC) filtering

A

It allows access to only selected devices, any other device trying to access the network will be rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enable encryption

A

Encryption protects data in transit and not data on the devices. The tow types of encryption are WEP and WAP 2.
WAP2 is the strongest encryption standard for wireless connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why disable SSID

A

SSID makes network visible to all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why DHCP should be disabled

A

Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses to anyone connected to the network. With DHCP disabled, static IP addresses must be used which reduces the
risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common attack methods to Wireless Network

A

War driving, war walking, war chalking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

war driving

A

Hackers drive around to sniff wireless network

Auditor uses the same technique to test wireless security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

war walking

A

Hackers walk around ( hotel, mall, public area) to sniff wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

war chalking

A

War chalking is the drawing of symbols in public places to advertise an open Wi-Fi network. These symbols are subsequently used by others to exploit weak wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(1)Which of the following should be disabled to increase security of wireless network against
unauthorized access?

A. MAC (Media Access Control) address filtering
B. Encryption
C. WPA-2 (Wi-Fi Protected Access Protocol)
D. SSID (service set identifier) broadcasting

A

Answer: D. SSID (service set identifier) broadcasting

Explanation:
A Service Set Identifier (SSID) is the network name broadcasted by a router and it is visible for all
wireless devices. When a device searches the area for wireless networks it will detect the SSID.
Disabling SSID broadcasting adds security by making it more difficult for unauthorized users to find
the network. For better security controls, MAC filtering & WPA-2 should be enabled (and not
disabled).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(2)Which of the following technique is more relevant to test wireless (Wi-Fi) security of an organization?

A. WPA-2
B. War dialling
C. War driving
D. Social Engineering

A

Answer: C. War driving

Explanation:
‘War Driving’ technique is used by hacker for unauthorised access to wireless infrastructure. War
driving is a technique in which wireless equipped computer is used to locate and gain access to
wireless networks. Same is done by driving or walking in and around building. ‘War Driving’ is also
used by auditors to test wireless. WPA-2 is an encryption standard and not a technique to test the
security. War dialling is a technique for gaining access to a computer or a network through the
dialling of defined blocks of telephone numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(3) Which of the following should be a concern to an IS auditor reviewing a wireless network?

A. System hardening of all wireless clients.
B. SSID (service set identifier) broadcasting has been enabled.
C. WPA-2 (Wi-Fi Protected Access Protocol) encryption is enabled.
D. DHCP (Dynamic Host Configuration Protocol) is disabled at all wireless access poin

A

Answer: B. SSID (Service Set IDentifier) broadcasting has been enabled.
Explanation:
Disabling SSID broadcasting adds security by making it more difficult for unauthorized users to find
the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(4)Dynamic Host Configuration Protocol (DHCP)is disabled at all wireless access points. Which of
the following statement is true when DHCP is disabled for wireless networks?

A. increases the risk of unauthorized access to the network.
B. decreases the risk of unauthorized access to the network.
C. automatically provides an IP address to anyone.
D. it disables SSID (Service Set Identifier).

A

Answer: B. decreases the risk of unauthorized access to the network.

Explanation:
Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses to anyone
connected to the network. With DHCP disabled, static IP addresses must be used and hence risk of
unauthorized access can be reduced. Option C is incorrect because DHCP does not provide IP
addresses when disabled. Option D is incorrect because disabling of the DHCP will not
automatically disables SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(5) Best method to ensure confidentiality of the data transmitted in a wireless LAN is to:

A. restrict access to predefined MAC addresses.
B. protect the session by encrypting with use of static keys.
C. protect the session by encrypting with use dynamic keys.
D. initiate the session by encrypted device.

A

Answer: C. protect the session by encrypting with use dynamic keys.

Explanation:
In any given scenario, confidentiality of the data transmitted in a wireless LAN is BEST protected, if
the session is encrypted using dynamic keys (as compared to static keys). When using dynamic
keys, the encryption key is changed frequently, thus reducing the risk of the key being compromised
and the message being decrypted. Option A & D will not ensure data confidentiality during transit.
Encryption of the data on the connected device addresses the confidentiality of the data on the
device, not the wireless session. When using dynamic keys, the encryption key is changed
frequently, thus reducing the risk of the key being compromised and the message being decrypted.
Limiting the number of devices that can access the network does not address the issue of encrypting
the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(6)Usage of wireless infrastructure for use of mobile devices within the organization, increases risk
of which of the following attacks?

A. Port scanning
B. Social Engineering
C. Piggybacking
D. War driving

A

Answer: D. War driving

Explanation:
‘War Driving’ technique is used by hacker for unauthorised access to wireless infrastructure. War
driving is a technique in which wireless equipped computer is used to locate and gain access to
wireless networks. Same is done by driving or walking in and around building. A war driving attuses a wireless Ethernet card, set in promiscuous mode, and a powerful antenna to penetrate wireless systems from outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(7)For man-in-the-middle attack, which of the following encryption techniques will BEST protect a wireless network?

A. Wired equivalent privacy (WEP)
B. MAC-based pre-shared key (PSK)
C. Randomly generated pre-shared key (PSK)
D. Service set identifier (SSID)

A

Answer: Randomly generated pre-shared key (PSK)
Explanation:

SSID is not an encryption technique.MAC address of a computer is fixed and often accessible. A
randomly generated PSK is stronger than a MAC-based PSK. WEP has been shown to be a very weak
encryption technique and can be cracked within minutes. The SSID is broadcast on the wireless
network in plaintext.

17
Q

How a confidentiality of the data transmitted in a wireless LAN is BEST protected

A

if the session is encrypted using dynamic keys (as compared to static keys)