Chapter 7 Securing Wireless LANs Flashcards
What is the wireless encryption standard that was part of the original 802.11 standard and used the RC4 encryption algorithm?
Wireless Equivalent Privacy (WEP)
What were the security vulnerabilities associated with WEP?
WEP had significant security vulnerabilities, making it easy to crack.
What encryption standard replaced WEP and introduced stronger security measures?
Wi-Fi Protected Access (WPA)
What encryption algorithm did WPA use, and what were its improvements over WEP?
WPA used RC4 encryption but implemented stronger security measures, such as pre-shared keys, making it more secure than WEP.
What is the most popular wireless encryption standard for over a decade?
WPA2
What encryption algorithm did WPA2 introduce, and how did it improve security over WPA?
WPA2 introduced the Advanced Encryption Standard (AES) instead of RC4, offering stronger security and backward compatibility with older devices.
What is the latest wireless encryption standard that provides enhanced security features?
WPA3
What are some features of WPA3 that enhance security?
WPA3 disallows outdated protocols, implements protected management frames, and introduces Simultaneous Authentication of Equals (SAE) for secure connections between devices.
What does RFID stand for, and what is its typical range?
RFID stands for Radio Frequency Identification, and its range is approximately 5 meters (16 feet).
How are RFID tags powered, and what are some common applications?
RFID tags are activated by proximity to a scanning device that emits power. Common applications include inventory control, pet locators, and embedded passports.
What is NFC, and how does it differ from RFID?
NFC stands for Near Field Communication and is a subset of RFID. NFC has a much closer range of about 5 centimeters (1.5 inches) and is commonly used for contactless payments and data sharing.
What are some uses of NFC tags, and how can they be programmed?
NFC tags can be programmed to contain various data, such as Wi-Fi network information. They can be used for personal applications like sharing network credentials with guests or for other data-sharing purposes.
What is the range of Bluetooth devices, and how do they need to be paired?
Bluetooth devices have varying ranges depending on their class, with Class 1 having a range of up to 100 meters (328 feet) and Class 2 having a range of about 10 meters (30 feet). Bluetooth devices need to be paired to establish trust and enable data transfer between them.
What are some common uses of Bluetooth, and what are potential attacks associated with it?
Bluetooth is used for applications like wireless headphones, smartphone connections to car stereos, and file sharing between devices. Potential attacks include Bluejacking and Bluesnarfing, which involve unsolicited messages and capturing Bluetooth network traffic, respectively.
What is Wi-Fi coverage, and how is it measured?
Wi-Fi coverage refers to the range of Wi-Fi signals from the transmission source. It is measured in decibel milliwatts (dBm), where higher values indicate stronger signal strength and better performance.
How can atmospheric conditions affect wireless transmissions?
Atmospheric conditions like snow, rain, or sandstorms can potentially affect Wi-Fi signals and cause disruptions in wireless communications.
What is a cantenna, and what is its purpose?
A cantenna is a homemade high-gain antenna that can extend the range of Wi-Fi signals. It is typically made using items like a Pringles can or an empty juice can and can improve connectivity to a wireless network.
What are the potential issues with channel overlapping in Wi-Fi networks?
Channel overlapping occurs when two wireless networks in close proximity use the same channel. This can cause interference and lead to unreliable Wi-Fi connections. It is important to configure Wi-Fi networks on unique channels to avoid overlap.