Chapter 5: Protecting Wireless Networks Flashcards

1
Q

802.11<i>x</i> Protocols

170

A
  1. 11- 1 or 2 Mbps at 2.4 GHz
  2. 11a- 54 Mbps at 5 GHz
  3. 11b- 11 Mbps at 2.4 GHz
  4. 11g- 54 Mbps at 2.4 GHz
  5. 11i- security updates, particularly to authentication
  6. 11n- up to 600 Mbps at 5 and 2.4 GHz
    * 802.11ac- up to 1 Gbps at 5 GHz
    * 802.11ad- up to 7Gbps at 60 GHz
    * **The 60 GHz band is also more secure due to a smaller radius of signal propagation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wired Equivalent Privacy (WEP)

171

A

Legacy wireless security that can be cracked in 5 minutes. TKIP was introduced to make it much more secure, but that has long since been broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Application Protocol (WAP)

172

A

used for ancient wireless devices. Uses WML for webpage display.
Sometimes the connection between the WAP server and the internet wasn’t encrypted, which created security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wi-Fi Protected Access (WPA)

172

A

Created to implement the 802.11i standard. WPA2 takes care of all of it, while WPA only lives up to some of it.
WPA uses TKIP, and WPA2 uses CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Transport Layer Security (WTLS)

173

A

Security for WAP.

Similar to TLS, but considerably less powerful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security levels in WAP

174

A

<b>A</b>nonymous authentication
-Anyone can connect to the web portal
<b>S</b>erver Authentication
-You must authenticate against a server
<b>T</b>wo-way (client server) authentication
-The server must authenticate with the client must authenticate with the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technologies used to communicate between WAP device and server
175

A
<b>W</b>ireless Session Protocol (WSP)
-Session information and connection
<b>W</b>ireless Transaction Protocol (WTP)
-Similar in function to TCP and UDP
<b>W</b>ireless Datagram Protocol (WDP)
-Common interface between devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Captive Portals

180

A

When you have to agree to terms and conditions in order to access the internet. An example of this would be at Starbucks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extensible Authentication Protocol

181

A

Framework of authentication for wireless networks.
The important ones are LEAP and PEAP.
It’s used for WPS, which is terrible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lightweight EAP

182

A

LEAP is Cisco proprietary and is being phased out. It requires mutual authentication, but it’s susceptible to dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protected EAP

182

A

PEAP was developed by Cisco, RSA, and Microsoft. It has native support in Windows (starting with XP), and has replaced all former versions of EAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Site Survey

185

A

You listen to a wireless network and you can see information about the network, including what systems are in use and which protocols they’re using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

War Driving

185

A

Driving around in search of wireless access points that are either unrestricted or easily hacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

War Chalking

185

A

Writing on a wall, on the street, on a sign, etc. information about a wireless access point you’ve jumped on to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blue Jacking

187

A

Spam over Bluetooth. It’s annoying, but mostly harmless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blue Snarfing

187

A

Hacking the device running Bluetooth to access files, wreak havoc, or whatever.