Chapter 5 - Protecting Wireless Networks Flashcards
Tell me the details on the 5 types of wireless protocols.
What are their letters? Bandwidth? Frequency?
5 -169,170
a - 54Mbps, 5 GHz b - 11 Mbps, 2.4 GHz, also called Wi-Fi g - 54 Mbps, 2.4 GHz i - WPA2 n - 600Mbps, 5 GHz and 2.4 GHz
Why was WEP weak?
5-171
because of the encryption algorithms it used, RC4
What was developed to strengthen WEP?
5-171
Temporal Key Integrity Protocol
Tell me the difference between WPA and WPA2.
5-172
WPA uses RC4 and TKIP.
WPA2 uses CCMP (uses AES) and uses the entire 802.11i standard.
What is WTLS? What does it provide?
5-173
Wireless Transport Layer Security, is the security layer of the Wireless Application Protocol. It provides authentication, encryption, and data integrity.
Inside, it has a handshake protocol, alert protocol, application protocol, change cipher spec protocol, and record protocol.
Tell me about the three levels of security in WAP.
5-174
Anonymous - virtually anyone can connect
Server - workstation must authenticate against the server.
Two-Way (client and server) - requires both ends of the connection to authenticate to confirm validity
You have a mobile environment using WAP security. Tell me about the 4 technologies used to provide services between the client pc and the WAP server.
5-175
Wireless Session Protocol - session info
Wireless Transaction Protocol - similar to TCP and UDP
Wireless Transport Layer Security - security layer of WAP
Wireless Datagram Protocol - common interface
This antenna has a 360 degree pattern and you’ll want to put it in the middle of the area to be covered.
5-178
omnidirectional
This antenna focuses the signal into one direction.
5-178
directional antenna
How much of an increase in dB does it take to double your output power?
5-178
3 dB
Tru/False: Access Points have MAC filtering turned on by default.
5-178
false
MAC filtering is synonymous with what?
5-178
network lock
Explain to me how a captive portal works.
5-180
requires users to agree to some condition before they use the network or internet
What is EAP? What are the 5 types?
5-181
Extensible Authentication Protocol
TLS, PSK, MD5, LEAP and PEAP
TTLS adds a layer of security against what kinds of attacks?
5-181
man in the middle attacks
eavesdropping
Tell me two times when you would use NFC.
5-182
near field communication is used in RFID and Wi-Fi
You have a WPS, Wi-Fi Protected Setup. What kind of attack is it susceptible to?
5-182
brute force
Why was LEAP created?
5-182
a quick fix for problems with WEP
How does LEAP work? What is it susceptible to?
5-182
requires mutual authentication
dictionary attacks
Why is PEAP the better option over EAP-TTLS?
5-183
because it establishes an encrypted channel between the server and the client.
what is cloaking?
5-183
turning off the SSID broadcast
You are intentionally interfering with a signal. what is this called?
5-185
jamming
You’ve discovered a weak access point and are leaving signals that point it out. what is this called?
5-186
war chalking
A rogue access point will be involved in what kind of attack?
5-186
evil twin
What’s the difference between bluejacking and bluesnarfing?
5-187
bluejacking-sending unsolicited message over a bluetooth connection
bluesnarfing-gaining unauthorized access through a bluetooth connection.
what is site surveying?
5 - 185
initially meant deermining whether a proposed location was free from interference.
now it means: primary method used to gather information about a wireless network, and virtually all wireless netwoks are vulnerable to site surveys