Topic 9: Wireless networking and security Flashcards

1
Q

Which of the following are WiFi technologies?

802.11a, 802.11b

CDMA, GSM

GSM, 802.11a

802.11b, 802.11i

A

802.11a, 802.11b.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WEP is not considered insecure because of a weak what?

implementation of passphrases

encryption algorithm

Initialisation Vector (IV)

IRP

A

Initialisation Vector (IV)

In other words, the IV is strong where as all the other points are the weak elements of WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of attack compromises the availability of a wireless network?

MAC Spoofing

MiTM

SSID sniffing

DoS

A

DoS

MAC Spoofing will not compromise availability, but may compromise authenticity and integrity.

MiTM will not compromise availability, but may compromise authenticity and integrity.

SSID sniffing will not compromise availability, but may compromise authenticity and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the minimum required encryption standard for WiFi networks?

WPA

LDAP

WEP

TKIP

A

WPA (using AES)

LDAP is a protocol used to talk with the directory service (eg. Active Directory).

WEP is a depreciated wireless encryption standard.

TKIP is a depreciated encryption algorithm used by WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What speed does the 802.11ax standard offer?

10Gbps

5Mbps

600Mbps

100Mbps

A

10Gbps

  1. 11ac = up to 1300Mbps
  2. 11n = up to 600Mbps
  3. 11g = up to 54Mbps
  4. 11b = up to 11Mbps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the most secure protocol to use when accessing a wireless network?

A. WEP

B. WPA

C. WPA2

D. TKIP

A

C. Wi-Fi Protected Access 2 (WPA2) is the most secure protocol listed for connecting to wireless networks. It is more secure than WPA and WEP. Wired Equivalent Privacy (WEP) is actually a deprecated protocol that should be avoided. The WEP algorithm is considered deficient for encrypting wireless networks. TKIP is also deprecated and is replaceable with CCMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of cabling is the most secure for networks?

A. STP

B. UTP

C. Fiber-optic

D. Coaxial

A

C. Fiber-optic is the most secure because it cannot be tapped like the other three copper-based cables; it does not emit EMI. Although shielded twisted-pair (STP) offers a level of security due to its shielding, it does not offer a level of security like that of fiber-optic and is not the best answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should you configure to improve wireless security?

A. Enable the SSID

B. IP spoofing

C. Remove repeaters

D. MAC filtering

A

D. MAC filtering disallows connections from any wireless clients unless the wireless client’s MAC address is on the MAC filtering list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly