14 - Wireless Security Flashcards

1
Q

Name the described Wi-Fi security protocol.

Brief description: Ensure wired-like privacy in wireless

Encryption: RC4

Data Integrity: CRC-32

Key Management: None

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the described Wi-Fi security protocol.

Brief description: Based on 802.11i without requirement for new hardware

Encryption: TKIP + RC4

Data Integrity: MIC algorithm

Key Management: 4-way handshake

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the described Wi-Fi security protocol.

Brief description: All mandatory 802.11i features and a new hardware

Encryption: CCMP/AES

Data Integrity: Cipher Block Chaining Message Authentication Code (based on AES)

Key Management: 4-way handshake

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the described Wi-Fi security protocol.

Brief description: Announced by Wi-Fi Alliance

Encryption: GCMP-256

Data Integrity: BIP-GMAC-256

Key Management: ECDH and ECDSA

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does BIP-GMAC-256 stand for?

A

256-bit Broadcast/Multicast Integrity Protocol Galois Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ECDH stand for?

A

Elliptic Curve Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ECDSA stand for?

A

Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is a symmetric encryption algorithm that uses the now antiquated DES algorithm three times in a row to encrypt your data.

A

triple data encryption standard (3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ___ standard is a symmetric key algorithm. Is considered a very secure form of encryption today.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does WEP stand for?

A

wired equivalent privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does WPA stand for?

A

Wi-Fi protected access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does IEEE stand for?

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which IEEE 802 standard is for wireless LAN connections?

a) 802.11
b) 802.1x
c) 802.3
d) 802.15

A

a) 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is one disadvantage of using WPA3 on a wireless network?

a) Transmission rates are higher using WPA2
b) WPA3 may not be supported by many older networks
c) Security levels are higher using WEP
d) The licensing fees can be costly on large networks

A

b) WPA3 may not be supported by many older networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why would someone choose to implement AES encryption over 3DES encryption?

a) To hide the network name form discovery protocols
b) Because they prefer to use a symmetric key algorithm
c) For a more secure level of encryption due to increased complexity
d) For transmission over long distances

A

c) For a more secure level of encryption due to increased complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In ___ mode, all wireless communication is performed in a peer-to-peer fashion and does not require or involve a WAP.

A

ad-hoc

17
Q

Which type of network does not require a wireless router or access point?

a) WAN
b) Infrastructure
c) SAN
d) Ad-hoc

A

d) Ad-hoc

18
Q

___ is a DOS attack where the attacker can force any client off of the network.

A

deauthentication (deauth)