51-100 Flashcards
Given: WLAN protocol analyzers can read and reject many wireless frame parameters.
What parameter is needed to physically locate rogue APs with a protocol analyzer?
A. signal strength
B. RSNE
C. RSSI
D. IP address
E. Noise Flow
A
802.11r introduces new frame exchange protocol to support key management during fast secure transitions. Two of the new exchange protocols are the Over-the –air protocol and the other-DS FT protocol.
In what ways do these frames exchange protocols differ from each other?
A. In Over-the –air protocol sends frames directly to new AP, while the other the DS FT protocol used the old AP to forward the frames to the New AP via the wired network.
B. Over-the –air FT protocol uses the 4 way handshake to establish encryption keys, while the over the DS ft protocol does not.
C. Over-the –air FT protocol is used during a layer 2 roam, while the over-the-DS FT protocol does not.
D. Over-the –air FT protocol used during layer 2 raom, while the over-the-DS FT protocol is used when layer 3 rams are occurring
E. Over-the –air FT protocol rules ion 802.11k neighbor reports to initiate roamingdecisions, while the other-the DS FT protocol does not.
A
Picture
ABC Company has deployed single channel architecture (SCA) solution to help overcome some of the common problems with the client roaming. The figure shows the overlapping coverage area of multiple APs in ABC’s network. In this network all APs are configured with the same channel and BSSID. PEAPv0/EAP-MSCHAPv2 is only supported authentication mechanism.
As the VoWiFi client move through out this network, what events are occurring?
A. STA-1 controls when and where to roam by using signal and performance matrices in accordance with the chipset drivers.
B. The WLAN controller is querying the RADIUS server for authentication before STA-1’s association is moved from one AP to the next.
C. STA-1 initiates open authentication and 802.11 associations with each AP prior to Roaming.
D. The WLAN controller controls the AP to which STA-1 is associated and transparently moves this association in accordance with STA-1’s physical location.
D
As part of large organization’s security policy how should a wireless security professional address to problem of rogue access points?
A. Use a WPA-2 Enterprise complaint security solution with strong mutual authentication and encryption.
B. Hide the SSID of legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.
C. All authorized APs should have there wired ports quarantined to specific VLAN for threat neutralization and analysis.
D. A trained employee should install and monitor and WIPS rogue detection and response measures.
E. Conduct through mutual facility scans with spectrum analyzers to detect rogue AP RF
D
Given: ABC corporation is selecting a security solution for there new WLAN. Two of there considered solutions PPTP VPN and 802.1XEAP. They have considered a PPTP VPN and because it is included with both server and desktop operating system. With both solutions are considered strong enough to adhere to corporate security police, the company is worried about security weakness of MS-CHAPv2 authentication.
As a consultant what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)
A. MS-CHAPv2 is secure when implemented with AES-CCMP encryption.
B. MS-CHAPv2 is complaint with WPA-personal, not WPA-2-Enterprise.
C. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
D. MS-CHAPv2 uses anonymous differ-Helliman authentication, and therefore secure.
E. MS-CHAPv2 is only secure when combined with WEP.
F. MS-CHAPv2 is subject to offline dictionary attacks.
C, F
Given: ABC Corporation’s 802.11 WLAN is comprised of a redundant WLAN controller paid and 30-access points. ABC implemented WEP encryption with IPSec VPN technology to secure there wireless communication because it was the strongest security solution available at the time it was implemented. IT management has had decided to upgrade the WLAN infrastructure and implement VoWiFi and is connected with security because most VoWiFi phones do no support IPSec.
As the wireless network administrator, what new security solution would be best for protecting ABC’s data?
A. Migrate to a new multi=factor security solution using WPA-2 personal, MAC filtering, SSID holding, stateful packet inspection and RBAC.
B. Migrate corporate data clients to WPA-Enterprise and segment VoWiFi phone by assigning them to a different frequency band.
C. Migrate corporate data and VoWiFi devices to WPA-2 Enterprise with OKC support, and segment VoWiFi data on separate VLAN.
D. Migrate all 802.11 data and devices to WPA-personal, and implement a secure DHCP server to allocate addresses from a segment subnet for the VoWiFi phones.
E. Migrate corporate data clients to WPA-2-Enterprise, and use the RADIUS server to implement MAC-base authentication of VoWiFi phones.
E
Select the answer option that arranges the numbered events in correct time sequence for a client associating to BSS using EAP-PEAPv0/MSCHAPv2.
1) Installation of PTK
2) Installation of 4-way handshake
3) 802.11 association
4) 802.1X uncontrolled port is opened for data traffic 5) Client validates server certificate
A. 1-2-4-2-5
B. 5-3-1-2-4
C. 3-4-2-1-5
D. 5-3-4-2-1
E. 4-3-2-1-5
C
When used as portal of WLAN authentication solution, what is rule of LDAP?
A. An authentication server (AS) that communicates directly with, and provide authentication for supplicant.
B. A SQL complaint authentication service capable of encryption key generation and distribution.
C. AnX500 standard compliant database that participates in the 802.1X port-based access control process
D. A data retrieval protocol used by an authentication server such as RADIUS.
E. A role-based access control mechanism for filtering data to/from authenticated stations
A
Given:A WLAN protocol analyzer captured the illustrated frame trace of an 802.11g (ERP) client station connecting to an 802.11g access point.
What is shown in included frame trace? (Choose 4)
A. Active scanning
B. WPA2-enterprise authentication
C. 802.11 open system authentication
D. 802.1X with dynamic WEP
E. 4-way handshake
A, B, C, E
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
A. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake even if connectivity is lost.
B. When the RF signal between a client and an access point is lost, the client will seek to reassociate with another access point with a different SSID and stronger high quality signal.
C. Client drivers typically scan for a connect to access points in the 22.4GHz band before scanning the 5GHz band.
D. When the RF signal between a client and in an access point is disrupted for more than a few seconds, the client device will repeatedly attempt the reestablish both layer 2 and layer 3 connections.
E. As specified by 802.11 standard, clients using open system authentication must allow direct client-to-client connections, even in infrastructure mode
D
Which of the following protocols is used to provide on-demand authentication within an ongoing data transmission?
A. LEAP
B. EAP
C. PPTP
D. CHAP
D
Which of the following is a common Windows authentication protocol used by the IEEE 802.1X security standard?
A. TACACS
B. LDAP
C. RADIUS
D. SSL/TLS
C
Which of the following authentication processes are specified by the IEEE 802.11 standards? Each correct answer represents a complete solution. Choose all that apply.
A. Open System authentication
B. RADIUS
C. Shared Key authentication
D. EAP
A, C
Which of the following methods are capable of operating in wireless networks? Each correct answer represents a complete solution. Choose all that apply.
A. EAP-TLS
B. LEAP
C. PEAP
D. EAP-TTLS
A, B, D
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?
A. Rainbow attack
B. DoS attack
C. Replay attack
D. ARP spoofing
B
Which of the following protocols uses a program layer located between the Internet’s Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers?
A. TFTP
B. HTTPS
C. SCP
D. SSL
D
You have been hired to perform a penetration test on a client’s network. You want to see if remote connections are susceptible to eavesdropping or perhaps session hijacking. Which network tool would be most helpful to you?
A. Vulnerability analyzer
B. Port scanner
C. Performance analyzer.
D. Protocol analyzer
D
Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?
A. Remote Authentication Dial-In User Service (RADIUS)
B. IEEE 802.1x
C. Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access 2 (WPA2)
B
Which of the following will you recommend for providing security?
A. HTTP
B. VPN
C. SSL
D. S/MIME
C
Which of the following tools is John using to crack the wireless encryption keys?
A. Kismet
B. AirSnort
C. Cain
D. PsPasswd
B