Chapter 5 - Protecting Wireless Networks Flashcards
Tell me the details on the 5 types of wireless protocols.
What are their letters? Bandwidth? Frequency?
5 -169,170
a - 54Mbps, 5 GHz b - 11 Mbps, 2.4 GHz, also called Wi-Fi g - 54 Mbps, 2.4 GHz i - WPA2 n - 600Mbps, 5 GHz and 2.4 GHz
Why was WEP weak?
5-171
because of the encryption algorithms it used, RC4
What was developed to strengthen WEP?
5-171
Temporal Key Integrity Protocol
Tell me the difference between WPA and WPA2.
5-172
WPA uses RC4 and TKIP.
WPA2 uses CCMP (uses AES) and uses the entire 802.11i standard.
What is WTLS? What does it provide?
5-173
Wireless Transport Layer Security, is the security layer of the Wireless Application Protocol. It provides authentication, encryption, and data integrity.
Inside, it has a handshake protocol, alert protocol, application protocol, change cipher spec protocol, and record protocol.
Tell me about the three levels of security in WAP.
5-174
Anonymous - virtually anyone can connect
Server - workstation must authenticate against the server.
Two-Way (client and server) - requires both ends of the connection to authenticate to confirm validity
You have a mobile environment using WAP security. Tell me about the 4 technologies used to provide services between the client pc and the WAP server.
5-175
Wireless Session Protocol - session info
Wireless Transaction Protocol - similar to TCP and UDP
Wireless Transport Layer Security - security layer of WAP
Wireless Datagram Protocol - common interface
This antenna has a 360 degree pattern and you’ll want to put it in the middle of the area to be covered.
5-178
omnidirectional
This antenna focuses the signal into one direction.
5-178
directional antenna
How much of an increase in dB does it take to double your output power?
5-178
3 dB
Tru/False: Access Points have MAC filtering turned on by default.
5-178
false
MAC filtering is synonymous with what?
5-178
network lock
Explain to me how a captive portal works.
5-180
requires users to agree to some condition before they use the network or internet
What is EAP? What are the 5 types?
5-181
Extensible Authentication Protocol
TLS, PSK, MD5, LEAP and PEAP
TTLS adds a layer of security against what kinds of attacks?
5-181
man in the middle attacks
eavesdropping