Wireless Networking and Security Flashcards
While reviewing wireless router logs, you notice wireless network usage by unfamiliar systems. How can you control which systems connect to your wireless network?
Disable DHCP.
Change the wireless router admin password.
Enable MAC address filtering.
Enable MAC address filtering.
MAC addresses are unique 48-bit hexadecimal identifiers for network cards. You can configure a list of allowed and blocked MAC addresses on your wireless router to limit which devices can connect
Enabling WPA on a WLAN provides what? (Choose two.)
Confidentiality
Integrity
Availability
Authorization
Confidentiality
Integrity
Wi-Fi Protected Access (WPA) encrypts packets on a wireless network to prevent unauthorized viewing of data (confidentiality), and it verifies that received data has not been tampered with (integrity)
In addition to encrypting wireless traffic, you configure your wireless router to require connecting users to authenticate against a RADIUS server. What type of security have you configured?
WEP
WPA2 Personal
WPA2 Enterprise
WPA2 Enterprise
Wi-Fi Protected Access version 2 (WPA2) Enterprise uses an authentication server to control access to a wireless network
You decide to capture network traffic with a sniffer while connected to a busy public Wi-Fi hotspot. After several minutes, you realize you can see only your own network traffic in addition to broadcasts and multicasts. Why can you not see anybody else’s wireless network traffic?
The SSID is not broadcasting.
MAC filtering is enabled.
Isolation mode is enabled.
Isolation mode is enabled.
Wireless isolation mode prevents wireless clients on the same wireless LAN (WLAN) from seeing one another
A curious IT professional drives through an industrial park late at night while scanning for unsecured wireless networks with a PDA. What is this called?
Network scanning
War driving
War dialing
War driving
War driving entails searching for wireless networks, often from within a moving vehicle
To which of the following security concerns does EAP apply?
Virus scanning
Hard disk encryption
Network authentication
Network authentication
Extensible Authentication Protocol (EAP) is a connecting device network authentication framework supporting methods such as PKI certificates, smartcards, and passwords. Wireless networks that support WPA or WPA2 commonly provide multiple EAP options to choose from for RADIUS authentication of connecting clients. It has several variants, such as a lightweight variant named EAP-FAST and EAP-TLS, which uses the TLS standard. EAP-TTLS doesn’t require the client to be authenticated with a signed PKI certificate, and PEAP encapsulates the EAP connection in an encrypted and authenticated tunnel
Which mechanism requires only a server-side PKI certificate to encrypt user authentication traffic?
EAP
PEAP
LEAP
PEAP
Protected Extensible Authentication Protocol (PEAP) creates a secure channel for user authentication using a server-side PKI certificate initially; then a symmetric session key is used for the remainder of the session
You are configuring access to a wireless LAN on a Windows 8.1 laptop. When you list available wireless networks, you notice multiple listings of Hidden Network. What wireless router option is in use for these hidden networks?
Disable SSID broadcast
MAC address filtering
WEP
Disable SSID broadcast
Disabling the station set identifier (SSID) suppresses the wireless network name in beacon packets. When scanning for wireless networks, some tools will not display these networks, but Windows 8.1 displays them as Hidden Network
Which wireless encryption protocol uses counter mode to make pattern detection difficult?
CCMP
CHAP
WEP
CCMP
Counter Mode CBC Message Authentication Protocol (CCMP) is a WPA2 standard that uses an AES block cipher with counter mode. Counter mode makes pattern detection difficult, thus making this a strong protocol
You are conducting a wireless site survey at a client site. The client expresses a desire to keep wireless transmissions secure. There is a single 802.11n wireless router with an omnidirectional antenna in the server room at one end of the building. WPA2 Enterprise and MAC filtering have been configured. What additional security issue should you address?
WPA2 Personal should be used.
MAC filtering is useless; MAC addresses are easily spoofed.
Move the wireless router to the center of the building.
Move the wireless router to the center of the building.
Omnidirectional antennae radiate radio signals in all directions, so a wireless router at one end of a building would allow connectivity from outside the building. Placing the wireless router in the center of the building would allow optimal wireless connectivity from within the building while minimizing radiation outside of the building
What can be done to secure a wireless network?
Decrease power transmission level to cover only the intended area.
Use a wireless encryption standard such as 802.3.
Change the DHCP-supplied default gateway address.
Decrease power transmission level to cover only the intended area.
Wireless routers can be configured with a transmit power level (measured in milliwatts). Increasing this value can, to a point, provide better wireless access to clients. Decreasing this value reduces the wireless coverage area, for example, to include a property only where legitimate access is required
A Windows user in your company issues the following command on their company wireless laptop: netsh wlan set hosted network mode=allow ssid=AcmeWLAN key=password. What best describes the security problem created by this user?
The user has administrative rights in Windows.
The key is not complex enough.
The user has created a rogue access point.
The user has created a rogue access point.
A rogue access point is either a software or hardware wireless access point that can allow unauthorized wireless access to a secure network, or it can pose as a valid access point. In this case, a Windows 7 computer with a wireless card will advertise itself as a wireless network named AcmeWLAN
You are the wireless network administrator. Users report unstable wireless 802.11g network connectivity. After careful examination, you realize 2.4 GHz wireless phones and Bluetooth devices are interfering with the Wi-Fi signal. Which choice offers the best solution?
Replace the 802.11g network with 802.11n.
Purchase a high-gain antenna for your wireless router.
Change the Wi-Fi channel used by your wireless router.
Change the Wi-Fi channel used by your wireless router.
The Wi-Fi 2.4 GHz range is divided into smaller bands (channels) that slightly overlap. If the wireless router is set to use channel 6 and other devices are interfering with it, select a channel furthest away from 6, perhaps channel 1 or 11
A hacker configures a rogue access point to appear as a legitimate Wi-Fi hotspot. Which term best describes this configuration?
Evil twin
Bad rogue
War driving
Evil twin
Evil twin is the term used to describe the situation in the question. This is a security risk because users are tricked into connecting to what appears to be a legitimate wireless network when in fact all the network traffic can be controlled and redirected by a malicious user
Which of the following refers to unsolicited messages sent to nearby Bluetooth devices?
Bluespamming
Bluejacking
Bluehacking
Bluehacking
Bluejacking refers to a Bluetooth user sending an anonymous message to another Bluetooth device such as a cell phone (assuming Bluetooth is enabled). Bluetooth is a short-range (10 meters) wireless technology running in the 2.4 GHz range