14. Wireless Security Fundamentals Flashcards
What does MIC stand for and what does it do?
Message Integrity Check
MIC is calculated on the data being encrypted and it ensures that someone didn’t alter the message.
What are the 4 categories of wireless security threats listed in the guide?
Rogue devices
Ad hoc networks
Client association issues
Passive or active attacks
What is a rogue client?
Any client that is associated to a rogue AP (an AP that is not a part of your network but can be heard by an AP on your network)
What does wIPS stand for?
Wireless Intrusion Protection System
What algorithm does WEP use?
RC4 cipher algorithm
How long are WEP keys?
40 or 104 bits long
represented by 10 or 26 hex digits
How is WEP used for authentication by an AP?
AP sends a challenge phrase which the client encrypts with the WEP key.
802.1x requires authentication before a client has access to what?
Wired network
What does EAP stand for?
Extensible Authentication Protocol
It is a framework for authentication
There are 3 roles in the 802.1x client authentication. What are they and who are they?
Supplicant - client
Authenticator - typically WLC
Authentication server (AS) - typically Radius server
LEAP (Lightweight EAP) uses what type of encryption?
RC4 cipher algorithm (this is why it shouldn’t be used)
What kind of keys does LEAP use?
Dynamic WEP keys
EAP-FAST, PEAP, and EAP-TLS all have an inner authentication and an outer authentication that uses what kind of tunnel for protection?
Transport Layer Security (TLS)
What are the differences between EAP-FAST, PEAP, and EAP-TLS in the way they do the inner authentication?
EAP-FAST uses PACs
PEAP uses a digital certificate from the AS but doesn’t require a certificate from the user
EAP-TLS require supplicant and AS to present digital certificates
What does TKIP stand for?
Temporal Key Integrity Protocol