Chapter 12 - Onwards - From Wireless networking Flashcards

1
Q

What are the effects of following :

  • Using a higher frequency
  • using a lower frequency
  • Increasing the signal power
A
  • If we use a wave with higher frequency, it will help us to increase the data throughput but it will decrease the transmitting distance.
  • Using low frequency will give a longer transmitting distances but it will decrease the throughput
  • By increasing the signal power, we will get longer transmitting distances but it can add distortion in wave.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 main frequency bands that are used in wireless networking?

A

900 MHz, 2.4 GHz, and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define 802.11b standard.

A

It uses 2.4 GHz band. Provides a maximum speed of 11 Mbps. It supports Data-rate-shifting technique. It uses DSSS - Direct Sequence Spread Spectrum as its modulation technique. It is susceptible to interference from devices that operate in 2.4 GHz range like Bluetooth, Microwave etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define 802.11g standard.

A

It also operates in 2.4GHz band. Provides maximum speed of 54Mbps. Uses OFDM - Orthogonal Frequency Division Multiplexing.
It is backward compatible with 802.11b standard but if any device that uses 802.11 b with the AP, all the other devices were forced to use DSSS modulation technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define 802.11a standard.

A

Operates in 5GHz band. Provides a speed of 54 Mbps. Uses OFDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define 802.11n standard.

A

It can work in both 2.4 GHz band and 5 GHz band. It uses MIMO - Multiple Input Multiple Output.
Supports a speed of 100 Mbps to 300 Mbps. It gets this speed using MIMO and by doubling the channel bandwidth to 40 MHz from 20 MHz that is used in 802.11a,b,g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define 802.11h standard.

A

It is an extension to 802.11a.
It provides 2 improvements ->
- DFS - dynamic frequency selection
- Transmit Power Control
- It also adds 11 more non-overlapping channels. Bringing the non-overlapping channels to 23 in this standard.

Rest of the things are same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define 802.11ac standard.

A

Provides a speed of 1Gbps
- Uses MU-MIMO (Multi user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are non-overlapping channels in 2.4GHz

A

1, 6, 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many non-overlapping channels do we get in 802.11a standard?

A

11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is goodput in wireless networks?

A

This is a actual speed that we get from a standard. Near about 70% of the throughput is used in the management of wireless network itself. So only 30% remains for data throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which standard provides more transmitting distance out of 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac?

A

802.11g provides longer transmitting distance as compared to 802.11a.
802.11n provides even longer distances than 802.11g and it’s transmitting distances are kind of similar to 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the common antenna types used in wireless networking?

A

Omni antennas -> These antennas have a spherical coverage
Dipole antennas -> These antennas have coverage in the shape of a bagel. These have antennas in opposite directions.
Yagi antennas -> These are directional antennas that point only in one direction.
Patch antennas -> these antennas cover just half part of the sphere. These are usually deployed on walls.

These antennas unit is dBi (Isotropic) or dBd (dipole)

  • dBd dipole antennas normally have 2.2 Db gain over its same value dBd antenna gain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 modes in which wireless device can be set?

A

We can either set it in ad-hoc mode or infra structure mode.

Ad-Hoc is also called Independent Basic Service set

APs are used in infrastructure mode. And in this mode, AP creates a Basic service set.
When APs work in a enterprise network and user can roam from one device to another in any fashion, it is called Extended Basic service set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does an AP work in a enterprise network?

A

In an enterprise network, AP is controlled by an Wireless controller.
So the job is divided between Light Weight AP and the WLC. LWAP is responsible for real time processes like data transfer over the wireless medium, encryption etc.
WLC deals with the RF management, security scheming, authentication etc.

WLC and LWAP talks to each other using Control and Provisioning of Wireless Access Point (CAPWAP) protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the common reasons for signal degradation?

A

It can be degraded by distance, interference, walls and barriers, protocol used

Walls and barriers can decrease the wireless range to as low as 25 feet only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what band is used by Bluetooth technologies and what is its operating range?

A

Bluetooth devices use 2.4GHz band and in optimal conditions, their range can be 30 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define one interesting thing about NFC - Near Field Communication

A

For NFC to work, actual antenna on receiver and the transmitter should be smaller than the wavelength used on both the transmitter and the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are IoT - Internet of things?

A

This means almost everything in nowadays is connected to the internet. Like Refrigerators, Alarms etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Z-wave technology?

A

It is a technology that is used in Home automation. In this technology, devices create a mesh network and they communicate from appliance to appliance using low energy radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define PoE - Power Over Ethernet.

A

PoE is a standard that provided power over ethernet. PoE provides a power of 15.4 watts.
PoE+ provides a power of 30 watts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What was the first Wireless security standard that was used in Wireless networking for encryption and authentication?

A

WEP - Wired Equivalent Privacy - This was the first standard that was created for encryption and authentication.
It used RC4 encryption algorithim. It used a initialization vector that was not very robust and it was 24 bits long. WEP used keys with with 2 key lengths - 64 bit and 128 bit out of which 24 bit was the Initialization vector. These were transferred in way which made them easily crackable.

WEP also provided shared key authentication which was not very secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Device WPA, WPA2 and which one is more secure?

A

WPA was the one who replaced WEP. IT was advertised as WPA + TKIP (Temporal Key integrity protocol). It still used RC4 algorithim. Can be easily cracked.

WPA2 - Wireless Protected Access 2 - it used AES encryption algorithim with CCMP (Some kind of Message integrity check). For authentication, we can either use pre-shared key on both the AP and the client or we can 802.1x standard that uses EAP - Extensible Authentication protocol.

Note - AES is a symmetrical standard that uses the same key for encryption and decryption. Thus it is faster than the RSA that uses public key encryption.
AES uses keys with 3 key lengths - 128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Client Isolation in todays Wireless networks?

A

With Client Isolation turned on, one Wireless client in a wireless network can’t see another wireless client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are some of the threats to wireless networks?

A

There can be rouge AP which can act as a Evil-Twin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define Point to Point protocol.

A

A PPP exists between 2 devices. For example - between 2 routers. It operates at Layer 2 of the OSI model and is used to transport the layer 3 protocols over serial links. Serial link can be a dial up, ISDN connection etc.

It consists of LCP (Link Control Protocol) and NCP (Network control Protocol)

LCP is responsible for establish a connection, authentication, error detection, multi link, load balancing

NCP worries about how to transport the Layer 3 data and what layer 3 data will be transported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Does PPP support authentication and why do we need it?

A

One router uses PPP authentication to validate the far end router.

For authentication, either it can use PAP (Password authentication Protocol) - Not secure
Or it can use MSCHAP which is MS Challenge Handshake Authentication protocol.

CHAP uses MD5 algorithim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is SSL VPN?

A

It is the process of creating a secure tunnel using SSL (Secure Socket Layer) protocol.
SSL uses RSA public key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define L2TP - Layer 2 tunneling protocol.

A

Note that it is not a secure protocol as it is based on a unsecure protocol which PPTP - Point to Point Tunneling protocol and it is not recommended to use.

It consists of 2 protocols - PPTP and Layer 2 Forwarding Technologies.

It can encapsulate any kind of protocol that works above layer 2. For example, it can support non-TCP/IP network.

30
Q

Define PPTP.

A

PPTP is Point to Point Tunneling protocol.
It is very unsecure protocol and no longer used in real world.

Though according to ComTIA, it is a secure tunneling protocol and it runs over port 1723.

It make use of 2 protocols. One is PPP and GRE.

31
Q

Define GRE.

A

GRE is Generic Routing encapsulation.
Term generic means it can encapsulate any kind of protocol. For example, it doesn’t matter whether the protocol is IPv4, IPv6, OSPF, EIGRP etc.

GRE uses a protocol type field in its GRE header that identified that protocol that is being encapsulated.

By default it does not provide any security. Data travels un-encrypted. Though it can used with IPSec for adding encryption to the GRE tunnel. IN GRE tunnel, IPSec will operate in transport mode instead of tunnel mode.

Also note the GRE header creates a extra header of 24 Bytes.

32
Q

Define IPSec protocol that we use for VPNs.

A

It is one of the protocols that is used in todays VPNs.
Mainly it has 2 protocols - AH (Authentication header) and ESP (Encapsulation Security Payload)

AH - it provides only authentication service.
ESP - it is provides both the encryption and authentication.

It can run in two modes. First is the tunnel mode and the 2nd is the transport mode.

33
Q

Define ISAKMP.

A

I am not clear about this one.

34
Q

Given me an example of common encryption protocols.

A

AES, DES, 3DES

35
Q

Define DES and 2 DES.

A

DES - Data Encryption Standard - It was first widely used encryption protocol. It is not longer used and it uses a key with length 54 bits which cab be easily cracked.

3DES - Data Encryption Standard - it was an upgrade to DES. As it’s name implies, it can use triple the key size as used in DES.
Also no longer used.

36
Q

Define AES.

A

It is a symmetric key cryptographic algorithim and is used in todays networks. It can use 128, 192, 256 bit key length.

It is faster than the public key cryptographic algorithms like RSA.

37
Q

Define PGP (Pretty Good Privacy) and where do we use it?

A

Pretty Good Privacy - it is based on public key cryptography and is used to secure email messages.
How does it work ->
Step 1 - Email message will be encryption with a session key
Step2 - Session key is encrypted with public key of the recipient
Step 3 - Encrypted message (called Cypertext) + the encrypted session key is sent to recipient.
Step 4 - Recipient decrypts the session key with its private key
Step 5 - Recipient decrypts the encrypted email message with the session key.

38
Q

Give me an example of RAS - Remote Access Service, devices.

A

RAS is a technique in which we remote access a device that is part of some Local Area Network. It is different from VPN as VPN makes our local computer part of the remote LAN. Whereas, RDP doesn’t.

RDP - Remote desktop Protocol,
ICA - Independent computing architecture
VNC - Virtual network connection

39
Q

Define RDP, ICA, VNC.

A

RDP is a Microsoft protocol. It runs on port number 3389. RDP client is called Remote Desktop Connection (RDC). RDP server is called RDS - Remote Desktop Service.

ICA - Independent Computing Architecture - it is protocol used by Citrix technologies. It is used in WinFrame software. WinFrame server can be deployed on a windows service and then we can install WinFrame client basically on any kind of OS device. It can be MAC OS, Windows, or even Linux.

VNC - Virtual Network Connection - it is also one of the RAS. It uses Remote Frame buffer protocol.

40
Q

What is SSO - Single Sign on.

A

SSO is Single Sign ON.
It is a technique that is used on LANs.
A client might have to access different kind of things in a LAN like Shared network drives, websites, email etc.

If SSO is working in this LAN, the client does not have to enter the password for each service. Client will just get a token from a token generating server that will tell what kind of access does user have to different services. When client tries to access anything, it passes on this token to the (Service providing) service.

It can be implemented by Kerberos, AAA servers like RADIUS, TACACS+

41
Q

What is LDAP - Light Wright Directory Access Protocol.

A

This protocol runs on 398 TCP port by default. Though, when used with SSL, it can run on port 636

It is a protocol a client / software can talk to the active directory. (With which it can access directory)

Active Directory is a hierarchy of objects, users, devices, network drives etc. It is a kind of phonebook of LANS that will have information about everything in the LAN.

42
Q

What are the different authentication methods?

A

PKI - Public Key infrastructure that consists of CAs (Certificate authorities) that helps with the certificate business.

MS-CHAP

EAP - Extensible authentication protcol

PSK - Pre-Shared Key

43
Q

Define Kerberos.

A

It is a entire security system.
It can provide authentication and authorization services.

When some client tries to access something, it is directed to the Kerberos server for authentication and authorization.
First Kerberos grants the TGT - Ticket Granting Ticket
And then when client gives back this TGT to the Kerberos server, based on what client is sent back a “application ticket”.

Based on this “application ticket”, client gets access to application server.

44
Q

Define RADIUS and TACACS+

A

These both are AAA servers. Authorization, Accounting and Authentication.

TACACS+ -> Terminal Access controller Access Control System - It runs on port number 49

These both devices are capable of performing authentication on behalf of multiple wireless APs, RAS servers or even LAN switches that are 802.1x capable.

Also note that TACACS+ utilizes the connection-based TCP protocol, but RADIUS uses UDP instead.

45
Q

What is NAC - Network Admission Control and what does it do?

A

Network Admission control devices or software first check if some device is safe and secure before allowing access to the network to that particular device.

46
Q

Define MS-CHAP version 2 and CHAP

A

In CHAP authentication, the password and username does not cross the wire.
It uses MD5 hashing function.

47
Q

What is EAP.

A

Do you remember it?

48
Q

What is persistent and non-persistent agent in Network Access Control systems.

A

Endpoint analysis is a kind of non-persistent agent

49
Q

What is Virus and define its types.

A

A virus is a type of Malware that gets activated upon user action. For example - by opening some kind of infected executable file.

There is 3 kind of viruses -

  1. File Virus - This is a kind of virus that attacks executable files like .exe, .com, .dll
    It can change some of the code of the target file or all the code. Once it is executed by the user, it will spread into other files and into other systems in the network.
  2. Marco virus - Macro viruses are not very harmful but it can be very annoying like it can increase our file size with no reason or it can alter some of the functions in our files.
    These viruses attack data files like Office 365 application files.

Note - Macro is that is a list of commands that are executed automatically to automate a task

  1. Boot Sector files - These are the files that attack boot sector.
50
Q

Define log in bomb.

A

Logic bomb is a type of malware that gets activated when certain event takes place like when some account gets disabled.

51
Q

What is a Multipartite virus?

A

It is a virus that attack files and boot sector files.

52
Q

What is a Zero day attack?

A

This means that there is a Malware attack that is new in the market and no solution exists yet to bock such a malware.

Note - Anti Malware devices contain malware definition files that defines different kind of malware and how to tackle them.

53
Q

What is a vulnerability?

A

It is a shortcoming in some software or network for which we don’t have a cure yet and it can be exploited by the attackers.

IPS comes for rescue in such situations.

54
Q

What are common precautions that we can take to lower the security risks?

A

Do following :

  1. Stop the unnecessary services
  2. Close any open ports that are not used
  3. Keep everything up to date
  4. Secure the Legacy systems
  5. Take care of unencrypted channels
55
Q

What is TEMPEST / RF Emanation?

A

TMEPEST is a part of NSA in US that find out in what ways attackers can steal information from RF signals, Electrical signals, vibration and it tells us the way how we can protect our system from such leaks.

56
Q

What is DNS poisoning?

A

In DNS poisoning, the local DNS server of a client is poisoned with a wrong IP address of a website. This Wrong IP belongs to the system of attacker

57
Q

What is War driving?

A

In War driving, the attacker go street to street and will look for open wifi networks

58
Q

What is a Wireless de-authentication?

A

It is a type of DoS attack. In this one, the attacker will send large number de-authentication frames (One type of Management frame) in the WLAN, causing the stations to be disconnected from the access point.

59
Q

What is a Rouge Access point.

A

It is a access point that we don’t manage. It can either be directly connected to the network via switch or it might act as a evil twin.

60
Q

Give me an example of Bluetooth related attacks.

A

First is Blues snarling - in this attack, the attacker takes control of the victims Bluetooth device and from there, the attacker can use the pairing function to transfer the data wirelessly.
So it recommended to turn on “undiscoverable mode” on Bluetooth devices when Bluetooth capability is not needed.

2nd is Bluejacking - it is a attack on Bluetooth devices in which attacker sends unsolicited message to the victim. This is not very harmful attack.

61
Q

What are active-x attacks.

A

These are the attacks that can be performed using active x and Java programs (applets).
Most ActiveX and Java applets are safe, but some contain viruses or snoop or spyware programs.

62
Q

What is a autorooter?

A

I am not clear

63
Q

What is banner grabbing / OUI?

A

Banner are messages that are configured on routers, switches, servers etc. These messages contain the information about the version of OS/ firmware used in these devices and what kind of firmware / OS. These are sent to users at following scenarios -
- When someone gets a authentication prompt to login
- when someone gets access to the router, switch, server
- when some one’s authentication request is denied.

Attacker can exploit these things to find the vulnerabilities.

64
Q

What is Social engineering?

A

It is a process in which attacker tries to get information from victims by pretending to be be a credible source.

65
Q

At the most basic level, what categories can the firewalls be divided into?

A

Firewalls can be divided into :
1. Standard firewalls - the one that block traffic based on ip address only
2. Extended firewalls:

66
Q

Give me an example of firewall role other than blocking the packets.

A

They can also be used to control what network we want the routing protocol to advertise. To accomplish, we apply ACLs on routing protocols, not on the router interfaces.

Note - applying ACLs on routing protocols is called distribution list

Doing so will filter the content of routing advertisements (it does not fully stop routing advertisements)

67
Q

How ACL rules works?

A

ACLs are kind of sequential conditions. Once a condition is met, no other condition that comes after is checked.

68
Q

What are the common ACL rules for incoming traffic that we configure on our production network?

A

Deny any packets from the internal addresses
- deny any packets from 127.0.0.0 range
- deny any packets from private addresses
- deny any address in the IP multicast range (224.0.0.0 /4)

69
Q

what is port security?

A

Port security is the process of applying security restrictions on the switch ports

70
Q

What is protocol switching?

A

it is the process of switching the protocol from one type into another. It can be use a its own firewall. For example - we can have IPX (Internetwork packet exchange) in our internal network

  • Or we a use IPX in a dead zone
71
Q

What is dynamic packet filtering?

A

It is a firewalls tool with which it creates a dynamic state table or state list of all the active connections through the firewall. This way firewall ensures that incoming packets are part of active connection.