Topic 9: Wireless networking and security Flashcards
Which of the following are WiFi technologies?
802.11a, 802.11b
CDMA, GSM
GSM, 802.11a
802.11b, 802.11i
802.11a, 802.11b.
WEP is not considered insecure because of a weak what?
implementation of passphrases
encryption algorithm
Initialisation Vector (IV)
IRP
Initialisation Vector (IV)
In other words, the IV is strong where as all the other points are the weak elements of WEP.
Which type of attack compromises the availability of a wireless network?
MAC Spoofing
MiTM
SSID sniffing
DoS
DoS
MAC Spoofing will not compromise availability, but may compromise authenticity and integrity.
MiTM will not compromise availability, but may compromise authenticity and integrity.
SSID sniffing will not compromise availability, but may compromise authenticity and integrity.
What is the minimum required encryption standard for WiFi networks?
WPA
LDAP
WEP
TKIP
WPA (using AES)
LDAP is a protocol used to talk with the directory service (eg. Active Directory).
WEP is a depreciated wireless encryption standard.
TKIP is a depreciated encryption algorithm used by WPA.
What speed does the 802.11ax standard offer?
10Gbps
5Mbps
600Mbps
100Mbps
10Gbps
- 11ac = up to 1300Mbps
- 11n = up to 600Mbps
- 11g = up to 54Mbps
- 11b = up to 11Mbps
Which of the following is the most secure protocol to use when accessing a wireless network?
A. WEP
B. WPA
C. WPA2
D. TKIP
C. Wi-Fi Protected Access 2 (WPA2) is the most secure protocol listed for connecting to wireless networks. It is more secure than WPA and WEP. Wired Equivalent Privacy (WEP) is actually a deprecated protocol that should be avoided. The WEP algorithm is considered deficient for encrypting wireless networks. TKIP is also deprecated and is replaceable with CCMP.
What type of cabling is the most secure for networks?
A. STP
B. UTP
C. Fiber-optic
D. Coaxial
C. Fiber-optic is the most secure because it cannot be tapped like the other three copper-based cables; it does not emit EMI. Although shielded twisted-pair (STP) offers a level of security due to its shielding, it does not offer a level of security like that of fiber-optic and is not the best answer.
What should you configure to improve wireless security?
A. Enable the SSID
B. IP spoofing
C. Remove repeaters
D. MAC filtering
D. MAC filtering disallows connections from any wireless clients unless the wireless client’s MAC address is on the MAC filtering list.