Wireless Network Security Flashcards

1
Q

Describe the following:
1) Wi-Fi
2) Bluetooth
3) RFID
40WiMAZ

A

1) Uses radio waves to allow devices to exchange data over the Internet.
2) Communicates, using Bluetooth, between devices over short distances.
3) Uses Radio Frequencies to transfer data.
4) Uses long distance wireless networking, belogns to the 802.16 wireless standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the following Wireless Networks:
1) WLAN
2) WPAN
3) WMAN
4) WWAN

A

1) Connectrs user in a local area, like a single room to entire campus.
2) Connects device within short range around an individual.
3) Spans a larger geographical area like a city or metro area.
4) Covers an entire region, nation or even the globe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe these components of a Wireless Network:
1) Acces Point (AP)
2) Wireless Cards (NIC)
3) Modem
4) Wireless Bridge

A

1) Hardware device that allows wireless devices to connect to a wireless network.
2) Devices needs a network interface card to establish a standard ethernet connection.
3) A device that receives and transmits network signals.
4) Connects multiple LANs to increase coverage of the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe these components of a Wireless Network:
1) Wireless Repeater
2) Wireless Router
3) Wireless Gateways
4) Wireless USB adapter

A

1) Retransmits existing signals captured from a router or AP to create a new network.
2) Performs the functions of a router and AP.
3) Routes data packets and functions as an AP.
4) Connects different devices to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe these types of Antennas:
1) Directional
2) Omnidirectional
3) Parabolic Grid
4) Yagi
5) Dipole
6) Reflector

A

1) Used to broadcasting radio waves from a single direction.
2) Provides a 360 pattern used for wireless base stations.
3) Is a pseudo ‘satellite-dish’ that can pick up Wi-Fi signal from 16 kms for more.
4) A unidirectional antenna for for VHF and UHF.
5) Bidirectional antenna used for client connections.
6) Concentrated antennas used to receive at a focal point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe these types of wireless encryption:
1) 802.11i
2) WEP
3) EAP
4) LEAP
5) WPA
6) TKIP

A

1) Specifies the security mechanisms for 802.11 networks.
2) An encryption algorithm for 802.11 networks.
3) Supports multiple authentication methods such as token cards, Kerberos, and certificates.
4) A proprietary version of EAP by CISCO.
5) Advanced encryption protocol that uses TKIP and MIC.
6) A security protocol used in WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe these types of wireless encryption:
1) WPA2
2) AES
3) CCMP
4) WPA2 Enterprise
5) RADIUS
6) PEAP
7) WPA3

A

1) Upgrade to WPA using AES and CCMP for encryption.
2) Symmetric-key encryption used in WPA2 to replace TKIP.
3) Encryption protocol used in WPA2.
4) Combination of WPA2 and EAP.
5) Centralized authentication and authorization management system.
6) Protocol that encapsulates EAP within a TLS tunnel.
7) Third-generation security protocol that used GCMP-256 and HMAC-SHA-384 for encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe these Authentication Protocols:
1) EAP-FAST
2) EAP-TLS
3) EAP-TTLS
4) IEEE802.1X
5) WPS

A

1) Flexible authentication via protected tunnels.
2) A digital certificate needs to be signed by both ends.
3) Advanced version of EAP-TLS that uses PKI to build a secure tunnel for safe key exchange.
4) Specifies the use of EAPoL and EAPoW for authentication.
5) Used to connect wireless devices to AP/WPS-enabled routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Open System Authentication?

A

An wireless device can be authenticated withthe AP when its WEP key matches that of the AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Shared Key Authentication?

A

The station and the AP use the same WEP key to provide authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly