1.6 Securing Wireless Networks Flashcards

1
Q

Created in 1997, the evolving standards that gives us the methods by which we create wireless local area networks.

A

IEEE802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most of the amendments to 802.11 have focused on the following.

A

Performance, frequency range, speed/bandwidth, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most recent approved 802.11 amendment, incorporated in the standard in 2016. Aggregated bandwidth of 1 Gbps and operates in the 5GHz frequency range. what many people look for today when purchasing new laptops smartphones and access points.

A

802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Not officially ratified at the moment, this is the next iteration of 802.11 amendments. Initial support suggests the possibility of aggregated bandwidth of 11 Gbps. Also known as the high efficiency amendment.

A

802.11ax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

New sets of naming conventions proposed by the Wi-Fi alliance

A

Wi-Fi generational names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wi-Fi 6 refers to this 802.11 amendment

A

802.11ax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attackers can use these to be within range of a wireless network from further away.

A

High Gain amplifiers and antennas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.11 amendment that tries to address some of the security shortcomings.

A

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This directly translates to the number of possible keys that can be used in cryptographic operations

A

key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These restrictions limited the key length of WEP to 40 bits

A

United States export restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With the RC4 cipher it is critical that this does not repeat

A

Keys, keying material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This was the security undoing of WEP

A

Improper key generation. Repeating of the 24 bit initialization vector (IV) that led to potential uncovering of the pre-shared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used by some cryptographic implementations to try and add uniqueness to each encryption operation. This becomes part of the encryption key.

A

Initialization vectors - IVs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keyspace for WEP initialization vectors

A

2^24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A nonprofit organization founded in 1999. goals of the organization were to provide standardization around interoperability, reliability, and the consistency of hardware that leveraged 802.11 technologies.

A

Wi-Fi alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This deprecated protocol is an improvement to how the encryption keys for the underlying RC4 stream cipher are generated

A

TKIP - temporal key integrity protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These checks help to make packet forgery and replay attacks more difficult

A

Integrity checks

18
Q

The Wi-Fi alliance will only certify a device for Wi-Fi 6 if the device supports this encryption protocol

A

WPA3

19
Q

WPA3 will support up to this key length for it’s AES based encryption

A

192 bit key length

20
Q

Once this is uncovered, an adversary might be able to decrypt any and all of the encrypted communication on the WLAN

A

Pre-shared key

21
Q

The newer handshake with WPA3 where pre shared keys are only used to authenticate to the network, and no longer to drive session keys for encrypted communication.

A

Dragonfly

22
Q

What a wireless access point uses to notify clients on changes in communication, such as channel usage.

A

management frames

23
Q

these devices are managers of the wlan. They are responsible for maintaining which channels to use for communication, handling clients connecting and disconnecting, and enforcing which security mechanisms to use.

A

Wireless access points

24
Q

A DoS attack where an adversary can impersonate an access point and transmit a spoofed management frame, disconnecting all connected clients.

A

Spoof of a disassociate request.

25
Q

Included in WPA3, this is designed to provide encryption on open, insecure networks.

A

OWE - opportunistic wireless encryption

26
Q

Type of attack when an adversary convinces technology to use older protocols or software.

A

Downgrade attack

27
Q

A type of attack where an adversary leverages peripheral knowledge of a system in order to infer something important about this system.

A

Side channel attack or timing attack.

28
Q

Attack where an adversary uses computational timing differences to determine information about a system.

A

Timing attack

29
Q

a situation where an individual, without permission, would bring their own wireless access point to work and connect it to the organization’s wired Network just so they can have their own wireless.

A

Rogue access point

30
Q

an attack where a fake access point is installed with the same name as the legitimate access point, and clients are tricked into communicating with the fake instead of the real access point.

A

Evil Twin AP or Masquerading AP

31
Q

This network access control method is an excellent way to mitigate the risk of a rogue AP, by preventing the rogue AP from being granted full access to the internal network.

A

802.1X

32
Q

This network access control method can restrict access to a network.

A

802.1X

33
Q

Two best prevention methods for evil twin rogue AP attacks.

A

Early detection. Certificates for mutual authentication to alert and users they are not connecting to a legitimate AP

34
Q

A way to describe and measure how well devices are able to hear each other.

A

SNR - signal to noise ratio

35
Q

A network that exists in close physical proximity to our person. Short distance, limited range.

A

PAN - personal area networks

36
Q

These are the standards for personal area networking

A

IEEE802.15

37
Q

This group governs the standards for Bluetooth, promoting standardization, interoperability, ease of use, product certification.

A

Bluetooth SIG - special interest group

38
Q

Chips that are usually soldered onto the motherboard of your device to provide functionality.

A

SoC - system on chip

39
Q

This technology is a low-cost, low bandwidth, potentially battery powered alternative to Bluetooth.

A

Zigbee

40
Q

This PAN technology is designed to work within a physical proximity of only one to two inches

A

NFC - near field communications

41
Q

This PAN technology is most commonly used as a method to uniquely identify an object and potentially to track its location.

A

RFID

42
Q

These are the biggest advancements in 5G technology

A

Low latency (< 1ms), high bandwidth (multi Gigabit), and support for large numbers of connected clients (high density).