Communication and Network Security - Wireless Flashcards

1
Q

What is the IEEE 802.11 Standard for WLAN (wireless LAN)?

A

WEP

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The WEP standard uses which symmetric algorithm? Unfortunately, usually all of the wireless devices and the AP share the exact same key.

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In most WEP implementations, the same IV values are used over and over again in the encryption process. Why is this a flaw?

A

Attackers can use the IV to identify patterns to reverse engineer the encryption process and get the encryption key. Now they can decrypt traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the IEEE standard number for WPA2?

A

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA solved the deficiencies of WEP without requiring hardware replacement by introducing new protocols, technologies, and algorithms. This protocol works by feeding WEP keying material, which is data used for generating new dynamic keys.

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol) uses CBC-MAC and which encryption algorithm?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of which technology in the new 802.11i standard provides access control by restricting network access until full authentication and authorization have been completed?

A

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the 802.11i standard, the use of EAP allows mutual authentication to take place between an authentication server and wireless device using the current infrastructure’s existing authentication technology. What does EAP stand for and what is it?

A

Extensible Authentication Protocol

EAP provides a framework to enable many types of authentication techniques to be used when ESTABLISHING network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the digital certificate-based authentication EAP protocol.

a. EAP-MSCHAPv2
b. EAP-FAST
c. PEAPv1
d. EAP-TLS

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This EAP protocol is a Cisco-proprietary replacement for LEAP which is a wireless LAN authentication method.

a. EAP-IKE2
b. EAP-FAST
c. PEAPv0
d. EAP-TLS

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This EAP variant provides mutual authentication and session key establishment using asymmetric or symmetric keys or passwords.

a. EAP-IKE2
b. EAP-FAST
c. EAP-MSCHAPv2
d. EAP-TLS

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This wireless standard extension uses DSSS and provides transfer rate of up to 11 Mbps and works in the 2.4-GHz frequency range.

a. 802.11b
b. 802.11g
c. 802.11a
d. 802.11n

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This wireless standard extension provides transfer rate of up to 54 Mbps and works in the 5-GHz frequency range. It uses OFDM and is therefore not backwards compatible with 802.11.

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This wireless standard extension provides transfer rate of up to 54 Mbps and works in the 2.4-GHz frequency range. It IS backwards compatible with 802.11.

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This wireless standard extension provides transfer rate of up to 100 Mbps and operates on both the 2.4-GHz and the 5-GHz frequency range.

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the weakest protection of your wifi network?

A. Used separate VLANS for each class of user.
B. Deploy a WIDS.
C. Change the default SSID
D. Logically put the AP in a DMZ with a firewall between the DMZ and internal network.
A

C