Chapter 28: Securing Wireless Networks Flashcards

1
Q

What are the components of a secure wireless connection?

A
  • Encryption
  • MIC
  • Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do we use to protect the integrity of data in a wireless frame?

A

MIC (message integrity check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Their were a wireless encryption method that been found to be vulnerable and is not recommended for use, name it!

A

WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used as an authentication framework when 802.1x is used on a WLAN?

A

EAP (Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Protocol should you avoid by selecting a method to protect the privacy and integrity of wireless data?

A

TKIP (Temporal Key Integrity Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What method dies the WPA2 use to ensure the data encryption and integrity?

A

CCMP (Counter/CBC-MAC Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Wi-Fi Alliance offers a certification for wireless devices that correctly implement security standards, What is it?

A

WPA2 (Wi-Fi Protected Access Version 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which wireless security configuration uses a pre-shared key?

A

WPA2 personal mode

WPA3 personal mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we ensure message privacy in wireless networks?

A

By encrypting traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does MIC work?

A

MIC creates a digital Stamp based on the transmitted data and encapsulates the Stamp in the encrypted message. The receiver de-encrypt the message and compares the Stamp with it own calculation to make sure the message has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the Open Authentication method.

A

Open authentication is true to its name; it offers open access to a WLAN. The only requirement is that a client must use an 802.11 authentication request before it attempts to associate with an AP. No other credentials are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where is Open Authentication method mainly used?

A

In public location (Normally the authentication then takes place in a form through a web browser where you can see and accept the terms for use and enter basic credentials)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which encryption protocol does the WEP use?

A

The RC4 cipher algorithm based on shared key concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is enabling 802.1x port-based access control provide?

A

It limits access to a network media until a client authenticates. This means that a wireless client might be able to associate with an AP but will not be able to pass data to any other part of the network until it successfully authenticates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where does authentication takes place in case of using 802.1x?

A

The authentication process occurs at a dedicated authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three entities forming the 802.1x arrangement?

A
  • Supplicant: The client device that is requesting access.
  • Authenticator: The network device that provides access to the network (usually a WLC)
  • Authentication Server: The device that takes user or client credentials and permits or denies network access based on a user database and policies (usually RADIUS Server)
17
Q

What is LEAP?

A

Light weight authentication protocol is a cisco proprietary used to counter the weakness in WEP by forcing the client to supply username and password credentials. The encryption method used for challange messages is now found to be vulnerable.

18
Q

How does EAP-FAST work?

A

EAP-Flexible Authentication by Secure Tunneling passes a PAC (protected access credential) between the AS and the supplicant. The PAC is a form of shared
secret that is generated by the AS and used for mutual authentication. EAP-FAST is a sequence of three phases:
* Phase 0: The PAC is generated or provisioned and installed on the client.
* Phase 1: After the supplicant and AS have authenticated each other, they negotiate a Transport Layer Security (TLS) tunnel.
* Phase 2: The end user can then be authenticated through the TLS tunnel for additional security.
Like other EAP-based methods, a RADIUS server is required. However, the RADIUS server must also operate as an EAP-FAST server to be able to generate PACs, one per user.

19
Q

What is the difference between EAP-FAST and PEAP?

A

PEAP (Protected EAP) uses a digital certificate on AS instead of PAC to authenticate itself with the supplicant. The client in PEAP must authenticate within the TLS tunnel using one of the following two methods:

  • MSCHAPv2: Microsoft Challenge Authentication Protocol version 2
  • GTS: Generic Token Card; a hardware device that generates one-time passwords for the user or a manually generated password
20
Q

What is the difference between PEAP and EAP-TLS?

A

EAP Transport Layer Security (EAPTLS) goes one step further by requiring certificates on the AS and on every client device.

21
Q

Which security features does TKIP adds to WEP?

A

The Temporal Key Integrity Protocol adds the following:
* MIC: This efficient algorithm adds a hash value to each frame as a message integrity check to prevent tampering.
* Time stamp: A time stamp is added into the MIC to prevent replay attacks that attempt to reuse or replay frames that have already been sent.
* Sender’s MAC address: The MIC also includes the sender’s MAC address as evidence of the frame source.
* TKIP sequence counter: This feature provides a record of frames sent by a unique MAC address, to prevent frames from being replayed as an attack.
* Key mixing algorithm: This algorithm computes a unique 128-bit WEP key for each
frame.
* Longer initialization vector (IV): The IV size is doubled from 24 to 48 bits, making it virtually impossible to exhaust all WEP keys by brute-force calculation.

22
Q

Which is more secure CCMP or TKIP?

A

CCMP is more secure. TKIP was deprecated in the 802.11-2012

23
Q

Which algorithms does CCMP uses?

A

The Counter/CBC-MAC Protocol consists of two algorithms:

  • AES (Advanced Encryption Standard) counter mode encryption
  • Cipher Block Chaining Message Authentication Code (CBC-MAC) used as a message integrity check (MIC)
24
Q

Which is more secure CCMP or GCMP?

A

GCMP is more secure.

25
Q

Which algorithms does GCMP uses?

A

The Galois/Counter Mode Protocol (GCMP) is a robust authenticated encryption suite that is more secure and more efficient than CCMP. GCMP consists of two algorithms:

  • AES (Advanced Encryption Standard) counter mode encryption
  • Galois Message Authentication Code (GMAC) used as a message integrity check (MIC)
26
Q

What is the original WPA based on?

A

Authentication with Pre-Shared Keys? Yes
Authentication with 802.1x? Yes
Encryption and MIC with TKIP? Yes
Encryption and MIC with AES and CCMP? Yes
Encryption and MIC with AES and GCMP? No

27
Q

What is the WPA2 based on?

A

Authentication with Pre-Shared Keys? Yes
Authentication with 802.1x? Yes
Encryption and MIC with TKIP? No
Encryption and MIC with AES and CCMP? Yes
Encryption and MIC with AES and GCMP? No

28
Q

What is the WPA3 based on?

A

Authentication with Pre-Shared Keys? Yes
Authentication with 802.1x? Yes
Encryption and MIC with TKIP? No
Encryption and MIC with AES and CCMP? No
Encryption and MIC with AES and GCMP? Yes

29
Q

What are the main two client authentication modes?

A
  • Personal mode: Pre-Shared Keys

* Enterprise mode: 802.1x