Chapter 12: Wireless Networking Flashcards
What is added to the management frame sent out on an AP? pg. 414
controllers generate a specific signature for each WLAN which is added to each frame it sends
What is AP’s process if it receives a management frame from an unknown SSID? pg. 414
reports the event to the controller and an alarm is generated
How does MFP protect management frames between the AP and client station? pg. 414
MFP allows clients to detect and drop bogus or invalid management frames
Two options to mitigate passive attacks on your network are __ and __. pg. 414
IDS/ Intrusion Detection System and IPS/ Intrusion Prevention System
T/F IDS only mitigates malware like viruses, Trojan horses, and worms. pg. 414
False….it also detects network attacks, data-driven attacks on apps, host-based attacks like privilege escalation, unauthorized logins, and access to sensitive files
The basic security created for IEEE 802.11 is……?? pg 416
the use of SSIDs, open or shared-key authentication, static WEP, and optional MAC authentication/ MAC filtering
What is the WEP key composed of ? pg. 417
either 40 or 128 bits and in its basic form, it’s usually statically defined by the network admin on the AP and all the clients that communicate with that AP
In what type of network would MAC address filters be considered sufficient? pg. 417
a small number of wireless clients that you don’t want to deploy an encryption-bases access method
What is RADIUS and what does this networking protocol offer? pg. 417
Remote Authentication Dial-In User Service offers security benefits: authorization, centralized access, and accounting supervision re: the users and/or PCs that connect to and access the network
What provision of RADIUS is deemed it’s reason for it’s rise to stardom? pg. 417
AAA: authentication, authorization, and accounting
What two defensive muscle goodies did TKIP/ Temporal Key Integrity Protocol introduce to the WiFi world? pg. 418
WPA/ Wi-Fi Protected Access and WPA2
A better form of wireless security than any other basic wireless security method is ___. pg. 420
WPA/WPA2 Pre-Shared Key (PSK)
What does the PSK/ Pre-Shared Key actually do? pg. 420
verifies users via a PW or identifying code/ passphrase on both the client machine and the access point
How is WPA a benefit over a static WEP key? pg. 420
WPA can change dynamically while the system is used
The most difficult security method to configure and maintain yet it is the most secure is…….? pg. 422
EAP-TLS / EAP Transport Layer Security