Wireless Networks Flashcards

1
Q

Wireless Local Area Network (WLAN)?

A

▪ Allows users to roam within a coverage area
▪ Popularity has increased exponentially
▪ Convenient to use and expand network access throughout a room, floor,
or building
▪ IEEE 802.11 is the most common type
▪ Other wireless options exist (used for PAN)
● Bluetooth
● Infrared (IR)
● Near-Field Communications (NFC)
● Ant+
● Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ad Hoc

A

Wireless devices communicate directly with
each other without the need for a centralized
access point
▪ Peer-to-Peer connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infrastructure

A

Wireless devices communicate with other
wireless or wired devices through a wireless
router or access point
▪ Traditional WiFi in Home and Office networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Access Point (AP or WAP)

A

▪ Expands wired LAN into the wireless domain
● Does not interconnect two networks
(not a router)
● Functions as a hub
▪ Connects wired LAN and wireless devices into the same subnet
▪ All clients on an access point are on a single collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Router

A

Gateway device and base station for wireless devices to communicate
with each other and connect to the Internet
▪ Often combines many features into one device:
● Wireless Access Point (WAP or AP)
● Router
● Switch
● Firewall
● Fiber, Cable, or DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

o Independent Basic Service Set (IBSS)

A

Contains only devices/clients with no APs(AD-HOC WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic Service Set (BSS)

A

Only one AP connected to the network (SOHO network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extended Service Set (ESS)

A

Contains multiple APs to provide coverage (College campus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mesh Topology

A

▪ May not use a centralized control
▪ Range of combined wireless defines network
▪ Uses WiFi, Microwave, Cellular, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP Placement

A

▪ Careful planning is required to
prevent the APs from interfering
with one another and still
maintaining the desired
coverage area in ESS
▪ Coverage should overlap
between APs to allow
uninterrupted roaming from one
cell to another but can’t use
overlapping frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP Placement (2.4 Ghz)

A

Non-overlapping coverage cells
for 2.4 GHz band should have
10% to 15% coverage overlap in
coverage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP Placement (5 Ghz

A

▪ Identical channels should be separated by at least two cells instead of
one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site Surveys

A

▪ Wireless survey to determine coverage areas
▪ Produces a heat map with coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Range Extenders

A

▪ Specialized device that overcomes distance limitations of wireless
networks
▪ Amplifies the signal and extends reachability or a wireless cell
▪ Wireless repeater receives signal on one antenna and repeats it on other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Antennas

A

Coverage areas vary based on the type used
▪ Most SOHO wireless APs have fixed antennas
▪ Enterprise-class APs support different types
▪ Factors in antenna effectiveness
● Distance
● Pattern of Wireless Coverage
● Environment (indoor/outdoor)
● Avoiding Interference with other APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Omnidirectional Antenna

A

Radiates power equally in all directions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unidirectional Antenna

A

Focuses Power in one direction for covering greater distances

18
Q

Spread Spectrum Wireless Transmissions

A

▪ Direct-Sequence Spread Spectrum (DSSS)
▪ Frequency-Hopping Spread Spectrum (FHSS)
▪ Orthogonal Frequency-Division Multiplexing (OFDM)
▪ Only DSS and OFDM are commonly utilized in today’s WLANs

19
Q

Direct-Sequence Spread Spectrum (DSSS)

A

Modulates data over an entire range of frequencies using a series of
signals known as chips
▪ More susceptible to environmental interference
▪ Uses entire frequency spectrum to transmit

20
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

Devices hop between predetermined frequencies
▪ Increases security as hops occur based on a common timer

21
Q

Orthogonal Frequency Division Multiplexing (OFDM)

A

Uses slow modulation rate with simultaneous transmission of data over
52 data streams
▪ Allows for higher data rates while resisting interference between data
streams

22
Q

Frequencies and Channels

A

IEEE 802.11 standards are differentiated by their characteristics, such as
frequency range used:
● 2.4 GHz band
o 2.4 GHz to 2.5 GHz range
● 5 GHz band
o 5.75 GHz to 5.875 GHz range
▪ Each band has specific frequencies (or channels) to avoid overlapping
other signals
▪ Channels 1, 6, and 11 will avoid overlapping frequencies in 2.4 GHz band

23
Q

Channel Bonding

A

Allows you to create a wider channel by merging neighboring channels
into one

24
Q

Radio Frequency Interference (RFI)

A

▪ Caused by using similar frequencies to WLAN
▪ Common sources of interference:
● Other wifi devices (overlapping channels)
● Cordless phones and baby monitors (2.4 GHz)
● Microwave ovens (2.4 Ghz)
● Wireless security systems (2.4 GHz)
● Physical obstacles (Walls, appliances, cabinets)
● Signal strength (Configurable on some devices)

25
Q

Carrier Sense Multiple Access/Collision (Avoidance/ Detection)

A

WLAN uses CSMA/CA to control access to medium, where wires Ethernet
uses CSMA/CD
▪ Listens for transmission to determine if safe to transmit
● If channel is clear, transmits Request to Send (RTS)
● Device waits for acknowledgment
● If received an RTS, responds with Clear to Send (CTS)
● If not received, device starts random back off timer

26
Q

Wireless Security

A

Wireless networks offer convenience, but also many security risks
▪ Encryption of data transferred is paramount to increasing security

27
Q

Pre-Shared Key

A

Both AP and client uses same encryption key
▪ Problems:
● Scalability is difficult if key is compromised
● All clients must know the same password

28
Q

Wired Equivalent Privacy

A

▪ Original 802.11 wireless security standard
● Claimed to be as secure as wired networks
▪ Static 40-bit pre-shared encryption key
● Upgraded to 64-bit and 128-bit key over time
▪ Uses 24-bit Initialization Vector (IV)
● Sent in clear text
▪ Brute Force Attack within minutes using AirCrack-ng and other tools

29
Q

Wi-Fi Protected Access (WPA)

A

▪ Replaced WEP and its weaknesses
▪ Temporal Key Integrity Protocol (TKIP)
● 48-bit Initialization Vector (IV) instead of 24-bit IV
● Rivest Cipher 4 (RC4) used for encryption
▪ Uses Message Integrity Check (MIC)
● Confirms data was not modified in transit
▪ Enterprise Mode WPA
● Users can be required to authenticate before exchanging keys
● Keys between client and AP are temporary

30
Q

Wi-Fi Protected Access 2 (WPA2)

A

▪ Created as part of IEEE 802.11i standard
● Requires stronger encryption and integrity checks
● Integrity checking through CCMP
o Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol
▪ Uses Advanced Encryption Standard (AES)
● 128-bit key or above
▪ Supports two modes
● Personal mode with pre-shared keys
● Enterprise mode with centralized authentication

31
Q

WEP and WPA/WPA2 Security Cracking

A

▪ Utilities can capture wireless packets and run mathematical algorithms to
determine the pre-shared key

32
Q

Network Authentication 802.1x

A

▪ Each wireless user authenticates with their own credentials
▪ Used also in wired networks

33
Q

Extensible Authentication Protocol (EAP)

A

Authentication performed using 802.1x
▪ EAP-FAST
● Flexible Authentication via Secure Tunneling
▪ EAP-MD5
▪ EAP-TLS

34
Q

MAC Address Filtering

A

▪ Configures an AP with a listing of permitted MAC addresses (like an ACL)
▪ Problems:
● Knowledgeable users can falsify their MAC easily using freely
available tools
● Examples:
o MAC Address Changer (Windows)
o MacDaddyX (OSX)

35
Q

Network Admission Control (NAC)

A

▪ Permits or denies access to the network based on characteristics of the
device instead of checking user credentials
▪ Conducts a posture assessment of client
● Checks the OS and antivirus version of client

36
Q

Captive Portals

A

▪ Web page that appears before the user is able to access the network
resources
▪ Webpage accepts the credentials of the user and presents them to the
authentication server

37
Q

Geofencing

A

GPS or RFID defines real-world boundaries
▪ Barriers can be active or passive
▪ Device can send alerts if it leaves area
▪ Network authentication can use it to determine access

38
Q

Disable SSID Broadcast

A

Configures an AP to not broadcast the name of the wireless LAN
▪ Problem:
● Knowledgeable users can still easily find the SSID using wireless
sniffing tools

39
Q

Rogue Access Point

A

Malicious users set up an AP to lure
legitimate users to connect to the AP
▪ Malicious users can then capture all
the packets (data) going through the
rogue access point

40
Q

Unsecured Wireless Networks

A

War Driving
● Occurs when users perform reconnaissance looking for unsecured
wireless networks
▪ War Chalking
● Occurs when users write symbols on a wall to notify others of AP
characteristics

41
Q
A