Wireless Networking and Security Flashcards

1
Q

You have discovered an unauthorized wireless router that a user plugged into a network jack in her office. Which term best describes this scenario?

Evil twin

Rogue access point

Jamming

A

Rogue access point

A rogue access point is an active unauthorized wireless access point (WAP). Unknowing users may use an unauthorized WAP for their own convenience at work, without realizing that the configuration could compromise network security. Malicious users can also deploy this to gain wireless access to a network if the access point is connected to a wired network, or their intent may be to trick users into connecting to the access point, because it has the same extended service set identifier (ESSID), or wireless network name, as a valid access point, so that they can capture user traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After reviewing device security logs, you learn that a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee’s smartphone and downloaded her contact list. Which type of attack has taken place?

Bluejacking

Bluesnarfing

Disassociation

A

Bluesnarfing

The theft of sensitive information using Bluetooth wireless technology is referred to as bluesnarfing. This technique does not require the target victim’s device to have Bluetooth discovery enabled, although Bluetooth itself must be turned on. Freely available tools can be used to discover and connect to a victim’s Bluetooth device to retrieve and delete contact lists, view phone call logs, make phone calls on the target device, and perform other nefarious deeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following represents a weakness of the Wired Equivalent Privacy (WEP) protocol?

128-bit initialization vector

Inability to secure connections with IPSec

24-bit initialization vector

A

24-bit initialization vector

Using a 24-bit value for the WEP initialization vector (IV) provides 16.7 million possible values, so reusing IVs is inevitable on busy Wi-Fi networks since very packet contains an IV. Given the capture of enough clear text IVs on a Wi-Fi network and WEP’s weak implementation of the RC4 cryptographic algorithm, attackers can easily determine the network encryption key (they already know 24 bits of it) using freely available tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to implement a network security solution that grants network access only after successful user authentication and device condition checks. What should you deploy?

WPS

EAP

IEEE 802.1x

A

IEEE 802.1x

IEEE 802.1x is the port-based network access control (NAC) standard. This solution requires that devices be authenticated before being granted wired or wireless network access. NAC can require that devices meet certain conditions such as device type and configuration, updates having been installed, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have been tasked with configuring WAPs in your organization so that authentication takes place on a secured server on a private network instead of directly on the WAP. What type of server should you implement?

Forward proxy server

Reverse proxy server

RADIUS server

A

RADIUS server

A Remote Authentication Dial-In User Service (RADIUS) server is a centralized authentication server that receives authentication requests on behalf of supplicants such as user devices, from RADIUS clients such as WAPs, and VPN concentrators of network switches. This prevents authentication from occurring on edge devices such as network switches, thus increasing security. RADIUS authentication traffic normally occurs over UDP port 1812

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which authentication protocol requires the client and server to be configured with a PKI certificate?

EAP-FAST

EAP-TTLS

EAP-TLS

A

EAP-TLS

Extensible Authentication Protocol – Transport Layer Security (EAP-TLS) is a network authentication protocol that requires a PKI certificate on both sides of a network connection, such as on a user’s smartphone and on a WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which authentication protocols require only the server to be configured with a PKI certificate? (Choose two.)

EAP-TTLS

EAP-TLS

EAP-FAST

PEAP

A

EAP-TTLS

PEAP

EAP-TTLS enhances EAP-TLS in that authentication occurs through an encrypted tunnel as opposed to over the network without a secure tunnel. Protected Extensible Authentication Protocol (PEAP) is commonly used for IEEE 802.1x authentication; it uses a server-side PKI certificate to create an encrypted connection through which password authentication occurs, after which network access is granted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which authentication protocol does not require the use of PKI certificates?

EAP-FAST

PEAP

EAP-TTLS

A

EAP-FAST

EAP-FAST is a network authentication protocol that uses a shared secret (PKI certificates are not required) to establish a secured encrypted tunnel between two end-points through which authentication then occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During a network security audit, open WAPs are discovered on the corporate network. Which security protocols can be enabled to add a layer of security to the use of the WAPs? (Choose two.)

WPA2

NFC

IV

WPA3

A

WPA2

WPA3

WPA versions 2 and 3 provide security beyond open Wi-Fi networks by encrypting connections using either WPA2 PSKs or WPA3 Simultaneous Authentication of Equals (SAE) keys configured on both ends of the connection, or by requiring authentication to a centralized RADIUS server (often called WPA enterprise) hosted on a protected network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When connecting to hotel Wi-Fi networks, employees are presented with a web page requiring further authentication before providing Internet access. What type of authentication method is in use?

Wi-Fi protected setup

Captive portal

PSK

A

Captive portal

Captive portals control Internet access, usually with a web page that displays automatically upon connecting to a network. The portal requires that the user enter a username, password, voucher number, or hotel room code, and the user must agree to the terms of use to access the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of your remote users has begun working from home. The user lives in a building in a small, one-bedroom apartment. After installing a wireless router at the his home, the user complains about intermittent wireless network disruptions. What is the most likely cause of this problem?

Wireless router placement

Cell phone tower interference

Overlapping Wi-Fi channels

A

Overlapping Wi-Fi channels

Multiple WAPs in close proximity to one another increase the possibility of overlapping Wi-Fi channels. One way to counter this is to change the channel used by the WAP, so if WAP1 is using channel 3, instead of using the next channel for WAP2, you would choose the furthest frequency band possible, such as channel 11. A Wi-Fi analysis tool can be used to conduct a site survey to determine local WAPs and their channel usage, as well as to provide a heat map, or visualization, of WAP signal coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which standard port is used to authenticate with a RADIUS server?

UDP 161

UDP 1812

TCP 80

A

UDP 1812

RADIUS server authentication uses a standard port number of UDP 1812

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are configuring wireless router WPA2 enterprise settings. Which items must be specified? (Choose two.)

PSK

Wireless channel

Shared secret

RADIUS server IP address

A

Shared secret

RADIUS server IP address

WPA2 enterprise settings use a RADIUS server for centralized authentication; thus a RADIUS shared secret used to authenticate the wireless router to the RADIUS server is required, and the RADIUS server IP address is required so the wireless router knows where to forward supplicant authentication requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You need to connect an IoT device with a QR code to a wireless network. The wireless network uses WPA3 security. Which WPA3 feature will solve the problem in this scenario?

Pre-shared key

RADIUS authentication

Wi-Fi Easy Connect

A

Wi-Fi Easy Connect

The Wi-Fi Easy Connect standard enables wireless network connectivity by simply scanning the WAP and IoT device quick response (QR) codes with a smartphone. The WAP QR code can be generated using a Wi-Fi Easy Connect app, while some phones have this capability built into their Wi-Fi settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following security protocols is designed specifically for Wi-Fi networks?

IPSec

SSL

WPA

A

WPA

Wi-Fi protected access (WPA), of which the current version is 3, supersedes WEP and WPA2 to provide Wi-Fi network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are configuring EAP-TTLS for wireless network authentication. Which statements regarding your configuration are correct? (Choose two.)

Clients require a PKI certificate.

Servers require a PKI certificate.

Servers do not require a PKI certificate.

Clients do not require a PKI certificate

A

Servers require a PKI certificate.

Clients do not require a PKI certificate

EAP-TTLS enhances EAP-TLS in that authentication occurs through an encrypted tunnel, as opposed to over the network without a secure tunnel. EAP-TLS is a network authentication protocol that requires a PKI certificate on both sides of a network connection, such as on a user’s smartphone and on a WAP; EAP-TTLS, however, requires only a server-side PKI certificate

17
Q

Which of the following are symmetric block ciphers? (Choose two.)

CBC-MAC

RSA

AES

ECC

A

CBC-MAC

AES

Cipher block chaining message authentication code (CBC-MAC) uses a symmetric block cipher such as AES with a shared secret key to encrypt message hashes (not the message itself) to authenticate messages

18
Q

To which network security protocol does Simultaneous Authentication of Equals (SAE) apply?

IPSec

WPA2

WPA3

A

WPA3

WPA3 can be configured to use SAE keys configured on both ends of the connection to provide Wi-Fi security. SAE keys are not susceptible to offline dictionary attacks due to how both connecting devices generate and agree upon group domain parameters during session setup. Parameters are never sent over the network, thus rendering SAE network conversation captures useless for dictionary attacks

19
Q

Which Wi-Fi component is used to manage multiple wireless routers?

PSK

WAP

WLAN controller

A

WLAN controller

Wireless local area network (WLAN) controllers are used in larger network environments where managing the settings of individual WAPs is not feasible. Each WAP has its own unique basic service set identifier (BSSID), which is the WAP MAC address

20
Q

Penetration testers are executing Wi-Fi disassociation attacks as part of their mandate. What type of behaviour can Wi-Fi users expect during the pen test?

Wi-Fi users will not notice anything unusual.

Wi-Fi users will notice wireless network performance degradation.

Wi-Fi users will notice Wi-Fi network disruptions.

A

Wi-Fi users will notice Wi-Fi network disruptions.

Disassociating a device from a wireless network is equivalent to unplugging a wired network computer from a network switch port. Wireless users will experience sporadic wireless network disruptions

21
Q

During the IEEE 802.1x authentication process, which term is used to describe a user’s smartphone device attempting to authenticate to the wired network through a wireless access point?

Applicant

Authenticator

Supplicant

A

Supplicant

Supplicant is the term used to describe an end-point client device attempting to authenticate to the network

22
Q

During the IEEE 802.1x authentication process, which network protocol is used between the supplicant and authenticator?

EAPOL

RADIUS

TCP

A

EAPOL

The initial connection between a supplicant and an IEEE 802.1x authenticator such as an Ethernet network switch occurs using the Extensible Authentication Protocol over LAN (EAPOL). After successful authentication, the authenticator flags the connected supplicant port as being authorized

23
Q

During the IEEE 802.1x authentication process, which network protocol is used between the authenticator and authentication server?

EAPOL

RADIUS

TCP

A

RADIUS

RADIUS is used between an authenticator such as a WAP and an authentication server. RADIUS traffic normally uses UDP port 1812

24
Q

A malicious user, Ivan, is attempting to learn the Wi-Fi password for a protected wireless network by creating a fake wireless access point identical to the real one. Ivan is hoping that users will connect to his fake WAP and provide their Wi-Fi passwords. What type of attack is this?

Jamming

Evil twin

Bluesnarfing

A

Evil twin

A rogue access point specifically configured to appear as a known legitimate access point is known as an evil twin. Malicious users deploy evil twins to trick users into connecting to their access point with the intent of stealing sensitive user information

25
Q

Which wireless protocol stack is used for contactless payments and ticketing applications?

WPA3

IEEE 802.1x

NFC

A

NFC

Near Field Communication (NFC) is a low-speed, close-proximity (approximately 4 centimeters, or 1.6 inches) wireless transmission standard often used for ticketing, inventory, or as a payment method

26
Q

What is the relationship between NFC and RFID?

RFID uses NFC.

Both operate at 900 MHz.

NFC uses RFID.

A

NFC uses RFID.

NFC is a low-speed, close-proximity (approximately 4 centimeters, or 1.6 inches) wireless transmission standard often used for ticketing, inventory, or as a payment method. NFC falls under the RFID protocol, which is normally used as method of uniquely identifying items (think inventory control) over radio waves

27
Q

A veterinary clinic implants chips into dogs so that information about each dog and owner can be read in case the dog gets loose. What types of technology are being used in this scenario? (Choose two.)

EAPOL

NFC

RFID

IEEE 802.1x

A

NFC

RFID

NFC is a low-speed, close-proximity (approximately 4 centimeters, or 1.6 inches) wireless transmission standard often used for ticketing, inventory or as a payment method. NFC is a type of RFID protocol, which is normally used as method of uniquely identifying items over radio waves. NFC exists within the RFID standards hierarchy. NFC dog chips can be read by anybody with an NFC-enabled smartphone to retrieve owner information

28
Q

Which term is used to describe RFID chips that do not have their own power supply?

Passive emitter

Active emitter

Passive receiver

A

Passive emitter

RFID is a standard method of uniquely identifying items over radio waves, such as for tracking inventory or building access cards. Passive emitters do not have their own power but wait for connections from an RFID reading device

29
Q

A hotel guest holds a room card near the door card reader to unlock her hotel room door. What type of system is being used?

EAPOL

RFID

IEEE 802.1x

A

RFID

RFID is a standard method of uniquely identifying items over radio waves and is used in hotel room access cards