Chapter 5 - Protecting Wireless Networks Flashcards

1
Q

Rene

Which standard defines wireless LANs transmitting at 1Mbps or 2Mbps bandwidths using 2.4 GHz frequency Spectrum

A

page 169

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rene
Which standard provides for security enhancements to the wireless standard with particular focus on authentication. The standard is often referenced as WPA2.

A

page 170

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rene

What wireless protocol was implemented in a number of wireless devices, including smartphones and other mobile devices?

A

page 171

Wired Equivalent Privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rene

Which Protocol uses a smaller version of HTML called WML, which is used for Internet displays?

A

page 172

Wireless Application Protocol (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rene

What provides an encrypted and authenticated connection between a wireless client and a server?

A

page 173

Wireless Transport Layer Security (WTLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rene

What is Anonymous Authentication?

A

page 174

This allows virtually anyone to connect to the wireless portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rene

What is Server Authentication?

A

page 174

This requires the workstation to authenticate against the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rene

What is 2-way Authentication?

A

page 174

This requires both ends of the connection (client and server) to authenticate to confirm validity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rene

Which Protocol provide services similar to TCP and UDP for WAP?

A

page 175

Wireless Transaction Protocol (WTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rene

What are the technologies used to provide services between devices?

A

page 175

  • Wireless Session Protocol (WSP) - manages the session information and connection between devices.
  • Wireless Transaction Protocol (WTP) - provides services similar to TCP & UDP for WAP.
  • Wireless Transport Layer Security (WTLS) is the security layer of WAP
  • Wireless Datagram Protocol (WDP) - provides the common interface between devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rene

What are captive Portals?

A

page 180

Require users to agree to some condition before they use the network or Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rene

What does NIST recommend that VPN use for validated encryption algorithms?

A

page 181

Federal Information Processing Standards (FIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rene

What are the five EAP types adopted by the WPA/WPA2 standard?

A

page 181

  • EAP-TLS
  • EAP-PSK
  • EAP-MD5
  • LEAP
  • PEAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rene

What technology that requires a user to bring the client close to the AP in order to verify that the device is present?

A

page 182

Near Field Communications (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rene

What is LEAP?

A

page 182
Lightweight Extensible Authentication Protocol (LEAP) was created by Cisco as an extension to EAP, but it’s being phased out in favor of PEAP.
It lacks native Windows support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rene

What is PEAP?

A

page 182
Protected Extensible Authentication Protocol (PEAP)
Cisco, RSA and Microsoft worked together to create PEAP,

17
Q

Rene

What is War Driving?

A

page 185

Refers to driving around town with a laptop looking for APs to communicate with.

18
Q

Rene

What is War Chalking?

A

page 185

Involves those who discover a way into the network leaving signals on, or outside.

19
Q

Rene

What is an Evil Twin Attack?

A

page186
Is where a rogue Wireless Access Point poses as a legitimate wireless service provider to information that users transmit.

20
Q

Rene

What is Bluesnarfing?

A

page 187

Gaining unauthorized access through a Bluetooth connection

21
Q

Rene

What is Bluejacking?

A

page 187

Sending if unsolicited messages (think spam) over a Bluejacking connection.

22
Q

Rene

What are some of the “Sandwich Shop Attack”?

A

page 188

  • Rogue Access Point
  • Jamming
  • Interference
  • Bluejacking
  • Evil Twin
  • Replay Attack
23
Q

Rene

What is CCMP?

A

page 172
Counter mode with Cipher block chaining Message Authentication Code Protocol (CCMP)
Uses a 128-bit AES encryption with 48-bit initialization vector.

24
Q

Rene

Where do you go to change the Order of Preferred Networks?

A

page 179

Start > Control Panel > Network and Sharing > Manage Wireless Networks

25
Q

Rene

What is cloaking?

A

page 183

turning off the SSID broadcast