Chapter 5 - Protecting Wireless Networks Flashcards

1
Q

Tell me the details on the 5 types of wireless protocols.
What are their letters? Bandwidth? Frequency?

5 -169,170

A
a - 54Mbps, 5 GHz
b - 11 Mbps, 2.4 GHz, also called Wi-Fi
g - 54 Mbps, 2.4 GHz
i - WPA2
n - 600Mbps, 5 GHz and 2.4 GHz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why was WEP weak?

5-171

A

because of the encryption algorithms it used, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was developed to strengthen WEP?

5-171

A

Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tell me the difference between WPA and WPA2.

5-172

A

WPA uses RC4 and TKIP.

WPA2 uses CCMP (uses AES) and uses the entire 802.11i standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is WTLS? What does it provide?

5-173

A

Wireless Transport Layer Security, is the security layer of the Wireless Application Protocol. It provides authentication, encryption, and data integrity.
Inside, it has a handshake protocol, alert protocol, application protocol, change cipher spec protocol, and record protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tell me about the three levels of security in WAP.

5-174

A

Anonymous - virtually anyone can connect
Server - workstation must authenticate against the server.
Two-Way (client and server) - requires both ends of the connection to authenticate to confirm validity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a mobile environment using WAP security. Tell me about the 4 technologies used to provide services between the client pc and the WAP server.

5-175

A

Wireless Session Protocol - session info
Wireless Transaction Protocol - similar to TCP and UDP
Wireless Transport Layer Security - security layer of WAP
Wireless Datagram Protocol - common interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This antenna has a 360 degree pattern and you’ll want to put it in the middle of the area to be covered.

5-178

A

omnidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This antenna focuses the signal into one direction.

5-178

A

directional antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How much of an increase in dB does it take to double your output power?

5-178

A

3 dB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tru/False: Access Points have MAC filtering turned on by default.

5-178

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC filtering is synonymous with what?

5-178

A

network lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain to me how a captive portal works.

5-180

A

requires users to agree to some condition before they use the network or internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is EAP? What are the 5 types?

5-181

A

Extensible Authentication Protocol

TLS, PSK, MD5, LEAP and PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TTLS adds a layer of security against what kinds of attacks?

5-181

A

man in the middle attacks

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tell me two times when you would use NFC.

5-182

A

near field communication is used in RFID and Wi-Fi

17
Q

You have a WPS, Wi-Fi Protected Setup. What kind of attack is it susceptible to?

5-182

A

brute force

18
Q

Why was LEAP created?

5-182

A

a quick fix for problems with WEP

19
Q

How does LEAP work? What is it susceptible to?

5-182

A

requires mutual authentication

dictionary attacks

20
Q

Why is PEAP the better option over EAP-TTLS?

5-183

A

because it establishes an encrypted channel between the server and the client.

21
Q

what is cloaking?

5-183

A

turning off the SSID broadcast

22
Q

You are intentionally interfering with a signal. what is this called?

5-185

A

jamming

23
Q

You’ve discovered a weak access point and are leaving signals that point it out. what is this called?

5-186

A

war chalking

24
Q

A rogue access point will be involved in what kind of attack?

5-186

A

evil twin

25
Q

What’s the difference between bluejacking and bluesnarfing?

5-187

A

bluejacking-sending unsolicited message over a bluetooth connection

bluesnarfing-gaining unauthorized access through a bluetooth connection.

26
Q

what is site surveying?

5 - 185

A

initially meant deermining whether a proposed location was free from interference.

now it means: primary method used to gather information about a wireless network, and virtually all wireless netwoks are vulnerable to site surveys