Wireless Networking and Security Flashcards
You have discovered an unauthorized wireless router that a user plugged into a network jack in her office. Which term best describes this scenario?
Evil twin
Rogue access point
Jamming
Rogue access point
A rogue access point is an active unauthorized wireless access point (WAP). Unknowing users may use an unauthorized WAP for their own convenience at work, without realizing that the configuration could compromise network security. Malicious users can also deploy this to gain wireless access to a network if the access point is connected to a wired network, or their intent may be to trick users into connecting to the access point, because it has the same extended service set identifier (ESSID), or wireless network name, as a valid access point, so that they can capture user traffic
After reviewing device security logs, you learn that a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee’s smartphone and downloaded her contact list. Which type of attack has taken place?
Bluejacking
Bluesnarfing
Disassociation
Bluesnarfing
The theft of sensitive information using Bluetooth wireless technology is referred to as bluesnarfing. This technique does not require the target victim’s device to have Bluetooth discovery enabled, although Bluetooth itself must be turned on. Freely available tools can be used to discover and connect to a victim’s Bluetooth device to retrieve and delete contact lists, view phone call logs, make phone calls on the target device, and perform other nefarious deeds
Which of the following represents a weakness of the Wired Equivalent Privacy (WEP) protocol?
128-bit initialization vector
Inability to secure connections with IPSec
24-bit initialization vector
24-bit initialization vector
Using a 24-bit value for the WEP initialization vector (IV) provides 16.7 million possible values, so reusing IVs is inevitable on busy Wi-Fi networks since very packet contains an IV. Given the capture of enough clear text IVs on a Wi-Fi network and WEP’s weak implementation of the RC4 cryptographic algorithm, attackers can easily determine the network encryption key (they already know 24 bits of it) using freely available tools
You need to implement a network security solution that grants network access only after successful user authentication and device condition checks. What should you deploy?
WPS
EAP
IEEE 802.1x
IEEE 802.1x
IEEE 802.1x is the port-based network access control (NAC) standard. This solution requires that devices be authenticated before being granted wired or wireless network access. NAC can require that devices meet certain conditions such as device type and configuration, updates having been installed, and so on
You have been tasked with configuring WAPs in your organization so that authentication takes place on a secured server on a private network instead of directly on the WAP. What type of server should you implement?
Forward proxy server
Reverse proxy server
RADIUS server
RADIUS server
A Remote Authentication Dial-In User Service (RADIUS) server is a centralized authentication server that receives authentication requests on behalf of supplicants such as user devices, from RADIUS clients such as WAPs, and VPN concentrators of network switches. This prevents authentication from occurring on edge devices such as network switches, thus increasing security. RADIUS authentication traffic normally occurs over UDP port 1812
Which authentication protocol requires the client and server to be configured with a PKI certificate?
EAP-FAST
EAP-TTLS
EAP-TLS
EAP-TLS
Extensible Authentication Protocol – Transport Layer Security (EAP-TLS) is a network authentication protocol that requires a PKI certificate on both sides of a network connection, such as on a user’s smartphone and on a WAP
Which authentication protocols require only the server to be configured with a PKI certificate? (Choose two.)
EAP-TTLS
EAP-TLS
EAP-FAST
PEAP
EAP-TTLS
PEAP
EAP-TTLS enhances EAP-TLS in that authentication occurs through an encrypted tunnel as opposed to over the network without a secure tunnel. Protected Extensible Authentication Protocol (PEAP) is commonly used for IEEE 802.1x authentication; it uses a server-side PKI certificate to create an encrypted connection through which password authentication occurs, after which network access is granted
Which authentication protocol does not require the use of PKI certificates?
EAP-FAST
PEAP
EAP-TTLS
EAP-FAST
EAP-FAST is a network authentication protocol that uses a shared secret (PKI certificates are not required) to establish a secured encrypted tunnel between two end-points through which authentication then occurs
During a network security audit, open WAPs are discovered on the corporate network. Which security protocols can be enabled to add a layer of security to the use of the WAPs? (Choose two.)
WPA2
NFC
IV
WPA3
WPA2
WPA3
WPA versions 2 and 3 provide security beyond open Wi-Fi networks by encrypting connections using either WPA2 PSKs or WPA3 Simultaneous Authentication of Equals (SAE) keys configured on both ends of the connection, or by requiring authentication to a centralized RADIUS server (often called WPA enterprise) hosted on a protected network
When connecting to hotel Wi-Fi networks, employees are presented with a web page requiring further authentication before providing Internet access. What type of authentication method is in use?
Wi-Fi protected setup
Captive portal
PSK
Captive portal
Captive portals control Internet access, usually with a web page that displays automatically upon connecting to a network. The portal requires that the user enter a username, password, voucher number, or hotel room code, and the user must agree to the terms of use to access the Internet
One of your remote users has begun working from home. The user lives in a building in a small, one-bedroom apartment. After installing a wireless router at the his home, the user complains about intermittent wireless network disruptions. What is the most likely cause of this problem?
Wireless router placement
Cell phone tower interference
Overlapping Wi-Fi channels
Overlapping Wi-Fi channels
Multiple WAPs in close proximity to one another increase the possibility of overlapping Wi-Fi channels. One way to counter this is to change the channel used by the WAP, so if WAP1 is using channel 3, instead of using the next channel for WAP2, you would choose the furthest frequency band possible, such as channel 11. A Wi-Fi analysis tool can be used to conduct a site survey to determine local WAPs and their channel usage, as well as to provide a heat map, or visualization, of WAP signal coverage
Which standard port is used to authenticate with a RADIUS server?
UDP 161
UDP 1812
TCP 80
UDP 1812
RADIUS server authentication uses a standard port number of UDP 1812
You are configuring wireless router WPA2 enterprise settings. Which items must be specified? (Choose two.)
PSK
Wireless channel
Shared secret
RADIUS server IP address
Shared secret
RADIUS server IP address
WPA2 enterprise settings use a RADIUS server for centralized authentication; thus a RADIUS shared secret used to authenticate the wireless router to the RADIUS server is required, and the RADIUS server IP address is required so the wireless router knows where to forward supplicant authentication requests
You need to connect an IoT device with a QR code to a wireless network. The wireless network uses WPA3 security. Which WPA3 feature will solve the problem in this scenario?
Pre-shared key
RADIUS authentication
Wi-Fi Easy Connect
Wi-Fi Easy Connect
The Wi-Fi Easy Connect standard enables wireless network connectivity by simply scanning the WAP and IoT device quick response (QR) codes with a smartphone. The WAP QR code can be generated using a Wi-Fi Easy Connect app, while some phones have this capability built into their Wi-Fi settings
Which of the following security protocols is designed specifically for Wi-Fi networks?
IPSec
SSL
WPA
WPA
Wi-Fi protected access (WPA), of which the current version is 3, supersedes WEP and WPA2 to provide Wi-Fi network security