Network Security (4) Flashcards

1
Q

Which of the following wireless security protocols was substantially weakened by its initialization vector?

WPA

WEP

WPA2

A

WEP

Wired Equivalent Privacy (WEP) was one of the first commercially available security protocols for wireless LANs. WEP requires 24 bits of the encryption key for the initialization vector, substantially weakening the encryption. WEP was soon found to be easily penetrated and was replaced by Wi-Fi Protected Access (WPA) and then WPA2. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unauthorized users are connecting to your wireless access point and gaining access to the network. Which of the following is a step you can take to prevent this from happening?

Disable SSID broadcasting

Use Kerberos for authentication

Place the access point in a DMZ

Implement MAC address filtering

A

Disable SSID broadcasting

Implement MAC address filtering

Disabling SSID broadcasting prevents a wireless network from appearing to clients. The clients must specify the SSID to which they want to connect. MAC address filtering is a form of access control list (ACL) that is maintained in the access point and that contains the addresses of devices that are to be permitted to access the network. Both of these mechanisms make it more difficult for unauthorized devices to connect to the access point. Kerberos is an authentication protocol used by Active Directory, and relocating the access point to a DMZ will not resolve the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following wireless security protocols uses TKIP for encryption?

WEP

WPA

WPA2

A

WPA

Wi-Fi Protected Access (WPA) is a wireless security protocol that was designed to replace the increasingly vulnerable Wired Equivalent Privacy (WEP). WPA added an encryption protocol called Temporal Key Integrity Protocol (TKIP). This too became vulnerable, and WPA2 was introduced, which replaced TKIP with an Advanced Encryption Standard protocol (CCMP-AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following standards defines a framework for the authentication process but does not specify the actual authentication mechanism?

WPA

EAP

TKIP

A

EAP

Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages. EAP is used on wireless networks and point-to-point connections and supports dozens of different authentication methods. Wi-Fi Protected Access (WPA) is a wireless encryption standard. Temporal Key Integrity Protocol (TKIP) is an encryption algorithm. Transport Layer Security (TLS) is an encryption protocol used for Internet communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP and 802.1X are components that help to provide which of the following areas of wireless network security?

Authentication

Authorization

Encryption

A

Authentication

Extensible Authentication Protocol (EAP) and 802.1X are both components of an authentication mechanism used on many wireless networks. EAP and 802.1X do not themselves provide authorization, encryption, or accounting services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following Extended Authentication Protocol (EAP) variants utilize tunneling to provide security for the authentication process? (Choose all correct answers.)

PEAP

EAP-FAST

EAP-TLS

EAP-PSK

A

PEAP

EAP-FAST

Protected Extended Authentication Protocol (PEAP) encapsulates EAP inside a Transport Layer Security (TLS) tunnel. Flexible Authentication via Secure Tunneling (FAST) also establishes a TLS tunnel to protect user credential transmissions. EAP-TLS uses TLS for encryption, but not for tunneling. EAP-PSK uses a preshared key to provide an authentication process that does not use encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following wireless network security protocols provides open and shared key authentication options?

WPA

WEP

WPA2

A

WEP

Wired Equivalent Privacy (WEP), which was one of the first commercially successful security protocols for wireless LANs, enabled administrators to choose between open and shared key authentication. The open option enabled clients to connect to the network with an incorrect key. The shared option required the correct key, but it also exposed the key to potential intruders. The correct option is not to use WEP at all, as it was easily penetrated and subsequently replaced by Wi-Fi Protected Access (WPA) and then WPA2. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages. None of the other three provides a choice between open and shared key options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following wireless LAN security protocols was rendered obsolete after it was found to be extremely easy to penetrate?

WEP

WPA

WPA2

A

WEP

Wired Equivalent Privacy (WEP) was one of the first commercially available security protocols for wireless LANs, but it was soon found to be easily penetrated and was replaced by Wi-Fi Protected Access (WPA) and then WPA2. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following protocols does the Wi-Fi Protected Access (WPA) security protocol use for encryption?

AES

TKIP

MD5

A

TKIP

WPA uses the Temporal Key Integrity Protocol (TKIP) for encryption. It does not use Advanced Encryption Standard (AES), which eventually replaced TKIP in WPA2. Secure Hash Algorithm (SHA) and Message Digest 5 (MD5) are both file hashing algorithms, not used for wireless network encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following stream ciphers does the Temporal Key Integrity Protocol (TKIP) use for encryption on a wireless network?

RC4

AES

CCMP

A

RC4

TKIP uses the RC4 stream cipher for its encryption. Advanced Encryption Standard (AES) is used with CCMP on version 2 of the Wi-Fi Protected Access (WPA2) security protocol, not version 1 (WPA), which uses TKIP. Secure Hash Algorithm (SHA) is a file hashing algorithm, not used for wireless network encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following wireless security protocols uses CCMP for encryption?

WEP

WPA

WPA2

A

WPA2

CCMP, the full name of which is Counter Mode Cipher Block Chaining Message Authentication Code Protocol, is based on the Advanced Encryption Standard (AES) and is the encryption protocol used with the Wi-Fi Protected Access II (WPA2) security protocol on wireless networks. CCMP is not used with version 1 of the WPA protocol or with Wired Equivalent Privacy. 802.1X is an authentication protocol, not used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCMP is based on which of the following encryption standards?

TKIP

RC4

AES

A

AES

CCMP, the full name of which is Counter Mode Cipher Block Chaining Message Authentication Code Protocol, is based on the Advanced Encryption Standard (AES) and is the encryption protocol used with the Wi-Fi Protected Access II (WPA2) security protocol on wireless networks. CCMP is not based on the Temporal Key Integrity Protocol (TKIP), which uses RC4 as its stream cipher. 802.1X is an authentication protocol, not used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have installed a new wireless access point on your network and configured it to use an SSID that is not broadcasted and WPA2 for security. Which of the following describes what you must do to configure your wireless clients?

Select the SSID from a list and then select WPA2 from the security protocol options provided.

Type the SSID manually and allow the client to automatically detect the security protocol.

Type the SSID manually and then select WPA2 from the security protocol options provided.

A

Type the SSID manually and then select WPA2 from the security protocol options provided.

An SSID that is not broadcast is not detectable by clients, so you must type it in manually. Security protocols are also not detectable, so you must configure the clients to use the same protocol you selected on the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A wireless network is configured to allow clients to authenticate only when the signal strength of their connections exceeds a specified level. Which of the following terms best describes this configuration?

Local authentication

Port security

Geofencing

A

Geofencing

Geofencing is the generic term for a technology that limits access to a network or other resource based on the client’s location. In wireless networking, geofencing is intended to prevent unauthorized clients outside the facility from connecting to the network. Local authentication is an application or service that triggers an authentication request to which the user must respond before access is granted. Port security is a method for protecting access to switch ports. Motion detection is a system designed to trigger a notification or alarm when an individual trespasses in a protected area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following best describes a wireless network that uses geofencing as a security mechanism?

A wireless network that allows clients to authenticate only when the signal strength of their connections exceeds a specified level.

A wireless network that requires users to log on to a wired system before they can authenticate on a wireless device.

A wireless network that requires users to have an Active Directory account located within the local site.

A

A wireless network that allows clients to authenticate only when the signal strength of their connections exceeds a specified level.

Geofencing is a mechanism that is intended to prevent unauthorized clients outside the facility from connecting to the network. The mechanism can take the form of a signal strength requirement, a GPS location requirement, or strategic placement of wireless access points. The other options listed are not descriptions of typical geofencing technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following forms of the Wi-Fi Protected Access (WPA) and WPA2 protocols require a RADIUS server? (Choose all correct answers.)

WPA-Personal

WPA-PSK

WPA-Enterprise

WPA-802.1X

A

WPA-Enterprise

WPA-802.1X

WPA-Enterprise, also known as WPA-802.1X, can use the Extensible Authentication Protocol (EAP) to support various types of authentication factors and requires a Remote Authentication Dial-In User Service (RADIUS) server. WPA-Personal, also known as WPA-PSK (preshared key), is intended for small networks and does not require RADIUS

17
Q

Which of the following forms of the Wi-Fi Protected Access (WPA) and WPA2 protocols call for the use of a preshared key?

WPA-Personal

WPA-Enterprise

WPA-EAP

A

WPA-Personal

WPA-Personal, also known as WPA-PSK, is intended for small networks and requires a preshared key. WPA-Enterprise, also known as WPA-802.1X, uses the Extensible Authentication Protocol (EAP) to support various types of authentication factors and requires a Remote Authentication Dial-In User Service (RADIUS) server

18
Q

Which of the following elements associates a public and private key pair to the identity of a specific person or computer?

Exploit

Signature

Certificate

A

Certificate

As part of a public key infrastructure (PKI), digital certificates are associated with a key pair, consisting of a public key and a private key. The certificate is issued to a person or computer as proof of its identity. A signature does not associate a person or computer with a key pair. An exploit is a hardware or software element that is designed to take advantage of a vulnerability. Resource records are associated with the Domain Name System (DNS)

19
Q

In addition to EAP-TLS, which of the following are also Extensible Authentication Protocol (EAP) variants that use the Transport Layer Security (TLS) protocol?

PEAP

EAP-PWD

EAP-MD5

EAP-FAST

A

PEAP

EAP-FAST

The Protected Extensible Authentication Protocol (PEAP) and EAP Flexible Authentication via Secure Tunneling (EAP-FAST) both use TLS tunneling to secure authentication transmissions. EAP Password (EAP-PWD) and EAP-MP5 do not use TLS for tunneling or any other purpose

20
Q

Which of the following wireless security protocols can enable network users to authenticate using smartcards?

WEP

WPA2

EAP

A

EAP

Wired Equivalent Protocol (WEP) and Wi-Fi Protected Access II (WPA2) are both wireless security protocols that control access to the network and provide encryption, using protocols like Advanced Encryption Standard (AES). These protocols do not provide authentication services, however. Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages. Its many variants provide support for the use of smartcards and other authentication factors, such as biometrics, in addition to traditional passwords

21
Q

Alice is a consultant working in your office, who has been given the SSID and the passphrase for the company’s wireless network, but she is unable to connect with her laptop. Which of the following security measures might be preventing her from connecting?

MAC filtering

Disabling SSID broadcast

Geofencing

A

MAC filtering

MAC filtering takes the form of an access control list (ACL) on the wireless network’s access points, listing the MAC addresses of all the devices that are to be permitted to access the network. If the MAC address of Alice’s laptop is not included in the ACL, she will be unable to connect to the network. Alice has been given the SSID of the network, so she should be able to connect, even if the access points are not broadcasting the SSID. Geofencing is intended to prevent users outside the office from accessing the network, so this should not be the problem. Alice has been given the passphrase for the network, so she should be able to configure WPA2 on her laptop

22
Q

Which of the following protocols provides wireless networks with the strongest encryption?

AES

TKIP

EAP

A

AES

Wi-Fi Protected Access (WPA) is a wireless security protocol that was designed to replaces the increasingly vulnerable Wired Equivalent Privacy (WEP). WPA added an encryption protocol called Temporal Key Integrity Protocol (TKIP). This too became vulnerable, and WPA2 was introduced, which replaced TKIP with the stronger CCMP-Advanced Encryption Standard (CCMP-AES). Extensible Authentication Protocol and 802.1X do not provide encryption

23
Q

When the Wi-Fi Protected Access (WPA) wireless security protocol was released to replace Wired Equivalent Privacy (WEP), it included the Temporal Key Integrity Protocol (TKIP) for encryption. Which of the following is not one of the improvements that WPA and TKIP provide over WEP?

TKIP enlarges the WEP encryption key.

TKIP modifies the encryption key for every packet.

TKIP eliminates the use of preshared keys.

A

TKIP eliminates the use of preshared keys.

TKIP augments the existing WEP encryption key, making it longer, enabling it to be changed for every packet, and enabling WPA to be deployed without replacing network adapter or access point hardware. TKIP does continue to support the use of preshared keys

24
Q

To connect a wireless client to a wireless access point using the Wi-Fi Protected Access II (WPA2) security protocol with a preshared key, which of the following must you supply on both devices?

Base key

Passphrase

Serial number

A

Passphrase

To use the WPA2 protocol with a preshared key, the client and the access point must both be configured with the same passphrase. The base key, the serial number, and the MAC address are all components that WPA2 uses to generate the encryption key for each packet

25
Q

Upgrading a wireless network from the Wired Equivalent Privacy (WEP) security protocol to Wi-Fi Protected Access (WPA) enables it to use the Temporal Key Integrity Protocol (TKIP) for encryption, which generates a unique key for each packet. Which of the following types of attacks does this capability prevent?

Denial-of-service attacks

Brute-force attacks

Replay attacks

A

Replay attacks

A replay attack is one in which an attacker utilizes the encryption key found in a previously captured packet to gain access to the network. Because TKIP generates a unique encryption key for every packet, it prevents this type of attack from being successful