4 Flashcards

1
Q

At which layer of the OSI model does encryption occur for 802.11 networks?

A

Encryption occurs at the data link layer (Layer 2) of the OSI model for 802.11 networks, while other encryption methods are built into higher layers of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of transmission technologies used in wireless networks?

A

Examples of transmission technologies in wireless networks include Orthogonal Frequency Division Multiplexing (OFDM) and Direct Sequence Spread Spectrum (DSSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some challenges associated with data transmission over wireless networks?

A

Challenges include the public broadcast of data, making it susceptible to interception. To mitigate this, strong encryption and methods for ensuring data integrity and non-repudiation are necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some vulnerabilities of Wired Equivalent Privacy (WEP)?

A

WEP has significant vulnerabilities, including poor randomization of the output keystream, static keys that do not change per session, and the use of a weak Integrity Check Value (ICV).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does WPA address the shortcomings of WEP?

A

WPA uses a 256-bit pre-shared key (PSK) for authentication and Temporal Key Integrity Protocol (TKIP) for encryption, providing stronger security measures compared to WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of IEEE 802.1x enterprise authentication?

A

IEEE 802.1x enterprise authentication ensures that each user has a separate login and password for wireless LAN authentication, replacing the use of static pre-shared keys (PSKs) and enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does Protected Extensible Authentication Protocol (PEAP) enhance security in wireless networks?

A

PEAP allows the use of digital certificates for mutual authentication between the server and the client, supporting multifactor authentication with technologies such as smart cards, biometric identification, and tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the weaknesses of the RC4 algorithm in WEP encryption?

A

The RC4 algorithm used in WEP encryption suffers from weaknesses such as poor randomization of the output keystream, making it susceptible to attacks like the Fluhrer, Mantin, and Shamir (FMS) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the ARP request replay attack work?

A

The ARP request replay attack generates new initialization vectors (IVs) by listening for ARP packets and retransmitting them to the access point, which responds with ARP packets containing new IVs, allowing the attacker to determine the WEP key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption method does WPA2 use?

A

WPA2 replaced RC4 with Advanced Encryption Standard (AES) encryption, providing stronger security measures compared to WEP and WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does WPA2 Enterprise differ from WPA2 Personal (PSK)?

A

WPA2 Enterprise integrates with 802.11x and uses a RADIUS server for authentication, providing centralized authentication, authorization, and accounting (AAA) management for users connecting to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main advantage of using IEEE 802.1x for authentication?

A

IEEE 802.1x allows for scalable authentication, enabling organizations to centrally manage and control user access to the network, improving security and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly