ch7 Beyond the Basic LAN Flashcards
Wireless Access Points are made with an identifying __, which can be __ in the case of a single WAP or ___ if the network has more than one of them
Service Set Identifier (SSID); Basic; Extended
when a Client sends a request to a WAP, that client is added to the WAP’s ___
Associated List
does the 802.11 standard contain any encryption of authentication?
no
___ was the first system developed to give basic authorization and encryption to 802.11, using the ___ protocol
Wired Equivalency Privacy (WEP); RC4
the 802.11i standard uses ___ for authentication and ___ for encryption
802.1x; AES
because most network hardware initially couldn’t handle the 802.11i standard, the ___ was developed for the transition, but has since been renamed ___
Temporal Key Integrity Protocol (TKIP); Wireless Protected Access (WPA)
it is sometimes possible to carry out a Replay Attack after someone logs into a wireless network by retrieving the ___ and extracting their password. This process is also known as ___
Session Key; SSL stripping
___ is when a server requires that users use secure protocols for their entire session
HTTP Strict Transport Security (HSTS)
if someone plugs their personal wireless access point into a LAN this is called a ___, but if they change its SSID to match yours, then it’s an ___
Rogue Access Point; Evil Twin
to boot people off a wireless network (so they are forced to login to an evil twin) either an illegal device called a ___ is used, or the command ___
802.11 Jammer; deauth
to harden a wireless network against attack, it is important to know all ___ and maintain ___
MAC and IP addresses for everything connected; patches and updates
for good WiFi coverage across a large flat area, use a ___ antenna; for a more 3D area use a ___ antenna; for a narrow but long distance use a ___ antenna and for just one side of a wall use a ___ antenna
Dipole; OMNI; Directional; Patch Graphic
to improve WiFi signal bandwidth, you could try changing the ___ from 2.4 GHz to 5 GHz, or adjust the ___
Band; Channel Width
___ means mimicking a different set of hardware than exists on a machine, whereas ___ means creating a new computer with it’s own OS but the same hardware
emulation; virtualization
three advantages of virtualization are:
consolidation of hardware; easier system recovery; convenience of IT research
a ___ allows you to see the different virtual machines, and can be either Type ___, launched on boot and independent of the OS, or type ___, which runs on top of the OS
Hypervisor; 1; 2
three threats to a virtualized network are:
Malware, VM Sprawl; VM Escape
the following three steps should be taken to harden a virtualized network:
cleaning data remnants; good policies; keeping patches updated