Wireless Networking and Security Flashcards
You have discovered an unauthorized wireless router that a user plugged into a network jack in her office. Which term best describes this scenario?
Evil twin
Rogue access point
Jamming
Rogue access point
A rogue access point is an active unauthorized wireless access point (WAP). Unknowing users may use an unauthorized WAP for their own convenience at work, without realizing that the configuration could compromise network security. Malicious users can also deploy this to gain wireless access to a network if the access point is connected to a wired network, or their intent may be to trick users into connecting to the access point, because it has the same extended service set identifier (ESSID), or wireless network name, as a valid access point, so that they can capture user traffic
After reviewing device security logs, you learn that a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee’s smartphone and downloaded her contact list. Which type of attack has taken place?
Bluejacking
Bluesnarfing
Disassociation
Bluesnarfing
The theft of sensitive information using Bluetooth wireless technology is referred to as bluesnarfing. This technique does not require the target victim’s device to have Bluetooth discovery enabled, although Bluetooth itself must be turned on. Freely available tools can be used to discover and connect to a victim’s Bluetooth device to retrieve and delete contact lists, view phone call logs, make phone calls on the target device, and perform other nefarious deeds
Which of the following represents a weakness of the Wired Equivalent Privacy (WEP) protocol?
128-bit initialization vector
Inability to secure connections with IPSec
24-bit initialization vector
24-bit initialization vector
Using a 24-bit value for the WEP initialization vector (IV) provides 16.7 million possible values, so reusing IVs is inevitable on busy Wi-Fi networks since very packet contains an IV. Given the capture of enough clear text IVs on a Wi-Fi network and WEP’s weak implementation of the RC4 cryptographic algorithm, attackers can easily determine the network encryption key (they already know 24 bits of it) using freely available tools
You need to implement a network security solution that grants network access only after successful user authentication and device condition checks. What should you deploy?
WPS
EAP
IEEE 802.1x
IEEE 802.1x
IEEE 802.1x is the port-based network access control (NAC) standard. This solution requires that devices be authenticated before being granted wired or wireless network access. NAC can require that devices meet certain conditions such as device type and configuration, updates having been installed, and so on
You have been tasked with configuring WAPs in your organization so that authentication takes place on a secured server on a private network instead of directly on the WAP. What type of server should you implement?
Forward proxy server
Reverse proxy server
RADIUS server
RADIUS server
A Remote Authentication Dial-In User Service (RADIUS) server is a centralized authentication server that receives authentication requests on behalf of supplicants such as user devices, from RADIUS clients such as WAPs, and VPN concentrators of network switches. This prevents authentication from occurring on edge devices such as network switches, thus increasing security. RADIUS authentication traffic normally occurs over UDP port 1812
Which authentication protocol requires the client and server to be configured with a PKI certificate?
EAP-FAST
EAP-TTLS
EAP-TLS
EAP-TLS
Extensible Authentication Protocol – Transport Layer Security (EAP-TLS) is a network authentication protocol that requires a PKI certificate on both sides of a network connection, such as on a user’s smartphone and on a WAP
Which authentication protocols require only the server to be configured with a PKI certificate? (Choose two.)
EAP-TTLS
EAP-TLS
EAP-FAST
PEAP
EAP-TTLS
PEAP
EAP-TTLS enhances EAP-TLS in that authentication occurs through an encrypted tunnel as opposed to over the network without a secure tunnel. Protected Extensible Authentication Protocol (PEAP) is commonly used for IEEE 802.1x authentication; it uses a server-side PKI certificate to create an encrypted connection through which password authentication occurs, after which network access is granted
Which authentication protocol does not require the use of PKI certificates?
EAP-FAST
PEAP
EAP-TTLS
EAP-FAST
EAP-FAST is a network authentication protocol that uses a shared secret (PKI certificates are not required) to establish a secured encrypted tunnel between two end-points through which authentication then occurs
During a network security audit, open WAPs are discovered on the corporate network. Which security protocols can be enabled to add a layer of security to the use of the WAPs? (Choose two.)
WPA2
NFC
IV
WPA3
WPA2
WPA3
WPA versions 2 and 3 provide security beyond open Wi-Fi networks by encrypting connections using either WPA2 PSKs or WPA3 Simultaneous Authentication of Equals (SAE) keys configured on both ends of the connection, or by requiring authentication to a centralized RADIUS server (often called WPA enterprise) hosted on a protected network
When connecting to hotel Wi-Fi networks, employees are presented with a web page requiring further authentication before providing Internet access. What type of authentication method is in use?
Wi-Fi protected setup
Captive portal
PSK
Captive portal
Captive portals control Internet access, usually with a web page that displays automatically upon connecting to a network. The portal requires that the user enter a username, password, voucher number, or hotel room code, and the user must agree to the terms of use to access the Internet
One of your remote users has begun working from home. The user lives in a building in a small, one-bedroom apartment. After installing a wireless router at the his home, the user complains about intermittent wireless network disruptions. What is the most likely cause of this problem?
Wireless router placement
Cell phone tower interference
Overlapping Wi-Fi channels
Overlapping Wi-Fi channels
Multiple WAPs in close proximity to one another increase the possibility of overlapping Wi-Fi channels. One way to counter this is to change the channel used by the WAP, so if WAP1 is using channel 3, instead of using the next channel for WAP2, you would choose the furthest frequency band possible, such as channel 11. A Wi-Fi analysis tool can be used to conduct a site survey to determine local WAPs and their channel usage, as well as to provide a heat map, or visualization, of WAP signal coverage
Which standard port is used to authenticate with a RADIUS server?
UDP 161
UDP 1812
TCP 80
UDP 1812
RADIUS server authentication uses a standard port number of UDP 1812
You are configuring wireless router WPA2 enterprise settings. Which items must be specified? (Choose two.)
PSK
Wireless channel
Shared secret
RADIUS server IP address
Shared secret
RADIUS server IP address
WPA2 enterprise settings use a RADIUS server for centralized authentication; thus a RADIUS shared secret used to authenticate the wireless router to the RADIUS server is required, and the RADIUS server IP address is required so the wireless router knows where to forward supplicant authentication requests
You need to connect an IoT device with a QR code to a wireless network. The wireless network uses WPA3 security. Which WPA3 feature will solve the problem in this scenario?
Pre-shared key
RADIUS authentication
Wi-Fi Easy Connect
Wi-Fi Easy Connect
The Wi-Fi Easy Connect standard enables wireless network connectivity by simply scanning the WAP and IoT device quick response (QR) codes with a smartphone. The WAP QR code can be generated using a Wi-Fi Easy Connect app, while some phones have this capability built into their Wi-Fi settings
Which of the following security protocols is designed specifically for Wi-Fi networks?
IPSec
SSL
WPA
WPA
Wi-Fi protected access (WPA), of which the current version is 3, supersedes WEP and WPA2 to provide Wi-Fi network security
You are configuring EAP-TTLS for wireless network authentication. Which statements regarding your configuration are correct? (Choose two.)
Clients require a PKI certificate.
Servers require a PKI certificate.
Servers do not require a PKI certificate.
Clients do not require a PKI certificate
Servers require a PKI certificate.
Clients do not require a PKI certificate
EAP-TTLS enhances EAP-TLS in that authentication occurs through an encrypted tunnel, as opposed to over the network without a secure tunnel. EAP-TLS is a network authentication protocol that requires a PKI certificate on both sides of a network connection, such as on a user’s smartphone and on a WAP; EAP-TTLS, however, requires only a server-side PKI certificate
Which of the following are symmetric block ciphers? (Choose two.)
CBC-MAC
RSA
AES
ECC
CBC-MAC
AES
Cipher block chaining message authentication code (CBC-MAC) uses a symmetric block cipher such as AES with a shared secret key to encrypt message hashes (not the message itself) to authenticate messages
To which network security protocol does Simultaneous Authentication of Equals (SAE) apply?
IPSec
WPA2
WPA3
WPA3
WPA3 can be configured to use SAE keys configured on both ends of the connection to provide Wi-Fi security. SAE keys are not susceptible to offline dictionary attacks due to how both connecting devices generate and agree upon group domain parameters during session setup. Parameters are never sent over the network, thus rendering SAE network conversation captures useless for dictionary attacks
Which Wi-Fi component is used to manage multiple wireless routers?
PSK
WAP
WLAN controller
WLAN controller
Wireless local area network (WLAN) controllers are used in larger network environments where managing the settings of individual WAPs is not feasible. Each WAP has its own unique basic service set identifier (BSSID), which is the WAP MAC address
Penetration testers are executing Wi-Fi disassociation attacks as part of their mandate. What type of behaviour can Wi-Fi users expect during the pen test?
Wi-Fi users will not notice anything unusual.
Wi-Fi users will notice wireless network performance degradation.
Wi-Fi users will notice Wi-Fi network disruptions.
Wi-Fi users will notice Wi-Fi network disruptions.
Disassociating a device from a wireless network is equivalent to unplugging a wired network computer from a network switch port. Wireless users will experience sporadic wireless network disruptions
During the IEEE 802.1x authentication process, which term is used to describe a user’s smartphone device attempting to authenticate to the wired network through a wireless access point?
Applicant
Authenticator
Supplicant
Supplicant
Supplicant is the term used to describe an end-point client device attempting to authenticate to the network
During the IEEE 802.1x authentication process, which network protocol is used between the supplicant and authenticator?
EAPOL
RADIUS
TCP
EAPOL
The initial connection between a supplicant and an IEEE 802.1x authenticator such as an Ethernet network switch occurs using the Extensible Authentication Protocol over LAN (EAPOL). After successful authentication, the authenticator flags the connected supplicant port as being authorized
During the IEEE 802.1x authentication process, which network protocol is used between the authenticator and authentication server?
EAPOL
RADIUS
TCP
RADIUS
RADIUS is used between an authenticator such as a WAP and an authentication server. RADIUS traffic normally uses UDP port 1812
A malicious user, Ivan, is attempting to learn the Wi-Fi password for a protected wireless network by creating a fake wireless access point identical to the real one. Ivan is hoping that users will connect to his fake WAP and provide their Wi-Fi passwords. What type of attack is this?
Jamming
Evil twin
Bluesnarfing
Evil twin
A rogue access point specifically configured to appear as a known legitimate access point is known as an evil twin. Malicious users deploy evil twins to trick users into connecting to their access point with the intent of stealing sensitive user information
Which wireless protocol stack is used for contactless payments and ticketing applications?
WPA3
IEEE 802.1x
NFC
NFC
Near Field Communication (NFC) is a low-speed, close-proximity (approximately 4 centimeters, or 1.6 inches) wireless transmission standard often used for ticketing, inventory, or as a payment method
What is the relationship between NFC and RFID?
RFID uses NFC.
Both operate at 900 MHz.
NFC uses RFID.
NFC uses RFID.
NFC is a low-speed, close-proximity (approximately 4 centimeters, or 1.6 inches) wireless transmission standard often used for ticketing, inventory, or as a payment method. NFC falls under the RFID protocol, which is normally used as method of uniquely identifying items (think inventory control) over radio waves
A veterinary clinic implants chips into dogs so that information about each dog and owner can be read in case the dog gets loose. What types of technology are being used in this scenario? (Choose two.)
EAPOL
NFC
RFID
IEEE 802.1x
NFC
RFID
NFC is a low-speed, close-proximity (approximately 4 centimeters, or 1.6 inches) wireless transmission standard often used for ticketing, inventory or as a payment method. NFC is a type of RFID protocol, which is normally used as method of uniquely identifying items over radio waves. NFC exists within the RFID standards hierarchy. NFC dog chips can be read by anybody with an NFC-enabled smartphone to retrieve owner information
Which term is used to describe RFID chips that do not have their own power supply?
Passive emitter
Active emitter
Passive receiver
Passive emitter
RFID is a standard method of uniquely identifying items over radio waves, such as for tracking inventory or building access cards. Passive emitters do not have their own power but wait for connections from an RFID reading device
A hotel guest holds a room card near the door card reader to unlock her hotel room door. What type of system is being used?
EAPOL
RFID
IEEE 802.1x
RFID
RFID is a standard method of uniquely identifying items over radio waves and is used in hotel room access cards