Wireless Network Security Flashcards
Describe the following:
1) Wi-Fi
2) Bluetooth
3) RFID
40WiMAZ
1) Uses radio waves to allow devices to exchange data over the Internet.
2) Communicates, using Bluetooth, between devices over short distances.
3) Uses Radio Frequencies to transfer data.
4) Uses long distance wireless networking, belogns to the 802.16 wireless standards.
Describe the following Wireless Networks:
1) WLAN
2) WPAN
3) WMAN
4) WWAN
1) Connectrs user in a local area, like a single room to entire campus.
2) Connects device within short range around an individual.
3) Spans a larger geographical area like a city or metro area.
4) Covers an entire region, nation or even the globe.
Describe these components of a Wireless Network:
1) Acces Point (AP)
2) Wireless Cards (NIC)
3) Modem
4) Wireless Bridge
1) Hardware device that allows wireless devices to connect to a wireless network.
2) Devices needs a network interface card to establish a standard ethernet connection.
3) A device that receives and transmits network signals.
4) Connects multiple LANs to increase coverage of the wireless network.
Describe these components of a Wireless Network:
1) Wireless Repeater
2) Wireless Router
3) Wireless Gateways
4) Wireless USB adapter
1) Retransmits existing signals captured from a router or AP to create a new network.
2) Performs the functions of a router and AP.
3) Routes data packets and functions as an AP.
4) Connects different devices to a wireless network.
Describe these types of Antennas:
1) Directional
2) Omnidirectional
3) Parabolic Grid
4) Yagi
5) Dipole
6) Reflector
1) Used to broadcasting radio waves from a single direction.
2) Provides a 360 pattern used for wireless base stations.
3) Is a pseudo ‘satellite-dish’ that can pick up Wi-Fi signal from 16 kms for more.
4) A unidirectional antenna for for VHF and UHF.
5) Bidirectional antenna used for client connections.
6) Concentrated antennas used to receive at a focal point.
Describe these types of wireless encryption:
1) 802.11i
2) WEP
3) EAP
4) LEAP
5) WPA
6) TKIP
1) Specifies the security mechanisms for 802.11 networks.
2) An encryption algorithm for 802.11 networks.
3) Supports multiple authentication methods such as token cards, Kerberos, and certificates.
4) A proprietary version of EAP by CISCO.
5) Advanced encryption protocol that uses TKIP and MIC.
6) A security protocol used in WPA.
Describe these types of wireless encryption:
1) WPA2
2) AES
3) CCMP
4) WPA2 Enterprise
5) RADIUS
6) PEAP
7) WPA3
1) Upgrade to WPA using AES and CCMP for encryption.
2) Symmetric-key encryption used in WPA2 to replace TKIP.
3) Encryption protocol used in WPA2.
4) Combination of WPA2 and EAP.
5) Centralized authentication and authorization management system.
6) Protocol that encapsulates EAP within a TLS tunnel.
7) Third-generation security protocol that used GCMP-256 and HMAC-SHA-384 for encryption and authentication.
Describe these Authentication Protocols:
1) EAP-FAST
2) EAP-TLS
3) EAP-TTLS
4) IEEE802.1X
5) WPS
1) Flexible authentication via protected tunnels.
2) A digital certificate needs to be signed by both ends.
3) Advanced version of EAP-TLS that uses PKI to build a secure tunnel for safe key exchange.
4) Specifies the use of EAPoL and EAPoW for authentication.
5) Used to connect wireless devices to AP/WPS-enabled routers.
What is Open System Authentication?
An wireless device can be authenticated withthe AP when its WEP key matches that of the AP.
What is Shared Key Authentication?
The station and the AP use the same WEP key to provide authentication.