Wireless Networks (2.1, 2.4, 4.2, 4.3 & 5.4) Flashcards

1
Q

Wireless Local Area Network (WLAN)

A

▪ Allows users to roam within a coverage area
▪ Popularity has increased exponentially
▪ Convenient to use and expand network access throughout a room, floor, or building
▪ IEEE 802.11 is the most common type
▪ Other wireless options exist (used for PAN)
● Bluetooth
● Infrared (IR)
● Near-Field Communications (NFC)
● Ant+
● Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ad Hoc

A

▪ Wireless devices communicate directly with each other without the need for a centralized access point
▪ Peer-to-Peer connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infrastructure

A

▪ Wireless devices communicate with other wireless or wired devices through a wireless router or access point
▪ Traditional WiFi in Home and Office networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Access Point (AP or WAP)

A

▪ Expands wired LAN into the wireless domain
● Does not interconnect two networks
(not a router)
● Functions as a hub
▪ Connects wired LAN and wireless devices into the same subnet
▪ All clients on an access point are on a single collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Router

A

▪ Gateway device and base station for wireless devices to communicate with each other and connect to the Internet
▪ Often combines many features into one device:
● Wireless Access Point (WAP or AP)
● Router
● Switch
● Firewall
● Fiber, Cable, or DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Independent Basic Service Set (IBSS)

A

What is independent basic service set?
A Independent Basic Service Set (IBSS) forms an ad hoc, independent, self-contained network with station-to-station traffic flowing directly, receiving data transmitted by another station, and only filtering traffic based on the MAC address of the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic Service Set (BSS)

A

The Basic Service Set is a term used to describe the collection of Stations which may communicate together within an 802.11 network. The BSS may or may not include AP (Access Point) which provide a connection onto a fixed distribution system such as an Ethernet network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extended Service Set (ESS)

A

An extended service set (ESS) is a wireless network, created by multiple access points, which appears to users as a single, seamless network, such as a network covering a home or office that is too large for reliable coverage by a single access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mesh Topology

A

▪ May not use a centralized control
▪ Range of combined wireless defines network
▪ Uses WiFi, Microwave, Cellular, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP Placement

A

▪ Careful planning is required to prevent the APs from interfering with one another and still maintaining the desired coverage area in ESS
▪ Coverage should overlap between APs to allow uninterrupted roaming from one cell to another but can’t use overlapping frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP Placement (2.4 Ghz)

A

▪ Non-overlapping coverage cells for 2.4 GHz band should have 10% to 15% coverage overlap in coverage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP Placement (5 Ghz)

A

▪ Identical channels should be separated by at least two cells instead of one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site Surveys

A

▪ Wireless survey to determine coverage areas

▪ Produces a heat map with coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Range Extenders

A

▪ Specialized device that overcomes distance limitations of wireless networks
▪ Amplifies the signal and extends reachability or a wireless cell
▪ Wireless repeater receives signal on one antenna and repeats it on other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Antennas

A

▪ Coverage areas vary based on the type used
▪ Most SOHO wireless APs have fixed antennas
▪ Enterprise-class APs support different types
▪ Factors in antenna effectiveness
● Distance
● Pattern of Wireless Coverage
● Environment (indoor/outdoor)
● Avoiding Interference with other APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Omnidirectional Antenna

A

Radiates power equally in all directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unidirectional Antenna

A

Focuses power in one direction for covering greater distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spread Spectrum Wireless Transmissions

A

▪ Direct-Sequence Spread Spectrum (DSSS)
▪ Frequency-Hopping Spread Spectrum (FHSS)
▪ Orthogonal Frequency-Division Multiplexing (OFDM)
▪ Only DSS and OFDM are commonly utilized in today’s WLANs

19
Q

Direct-Sequence Spread Spectrum (DSSS)

A

▪ Modulates data over an entire range of frequencies using a series of signals known as chips
▪ More susceptible to environmental interference
▪ Uses entire frequency spectrum to transmit

20
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

▪ Devices hop between predetermined frequencies

▪ Increases security as hops occur based on a common timer

21
Q

Orthogonal Frequency Division Multiplexing (OFDM)

A

▪ Uses slow modulation rate with simultaneous transmission of data over 52 data streams
▪ Allows for higher data rates while resisting interference between data streams

22
Q

Frequencies and Channels

A

▪ IEEE 802.11 standards are differentiated by their characteristics, such as frequency range used:
● 2.4 GHz band
o 2.4 GHz to 2.5 GHz range
● 5 GHz band
o 5.75 GHz to 5.875 GHz range
▪ Each band has specific frequencies (or channels) to avoid overlapping other signals
▪ Channels 1, 6, and 11 will avoid overlapping frequencies in 2.4 GHz band

23
Q

Channel Bonding

A

▪ Allows you to create a wider channel by merging neighboring channels into one

24
Q

802.11 Wireless Standards

A

▪ 802.11 ax
● 6 Ghz spectrum
● Can reach speeds of up to 9.6 Gbps using MU-MIMO technology
● Fully backward compatible with Wireless A, B, G, N, and AC devices

25
Q

Radio Frequency Interference (RFI)

A

▪ Caused by using similar frequencies to WLAN
▪ Common sources of interference:
● Other wifi devices (overlapping channels)
● Cordless phones and baby monitors (2.4 GHz)
● Microwave ovens (2.4 Ghz)
● Wireless security systems (2.4 GHz)
● Physical obstacles (Walls, appliances, cabinets)
● Signal strength (Configurable on some devices)

26
Q

Carrier Sense Multiple Access/Collision (Avoidance/ Detection)

A

▪ WLAN uses CSMA/CA to control access to medium, where wires Ethernet uses CSMA/CD
▪ Listens for transmission to determine if safe to transmit
● If channel is clear, transmits Request to Send (RTS)
● Device waits for acknowledgment
● If received an RTS, responds with Clear to Send (CTS)
● If not received, device starts random back off timer

27
Q

Wireless Security

A

o Wireless networks offer convenience, but also many security risks
▪ Encryption of data transferred is paramount to increasing security

28
Q

Pre-Shared Key

A

▪ Both AP and client uses same encryption key
▪ Problems:
● Scalability is difficult if key is compromised
● All clients must know the same password

29
Q

Wired Equivalent Privacy

A

▪ Original 802.11 wireless security standard
● Claimed to be as secure as wired networks
▪ Static 40-bit pre-shared encryption key
● Upgraded to 64-bit and 128-bit key over time
▪ Uses 24-bit Initialization Vector (IV)
● Sent in clear text
▪ Brute Force Attack within minutes using AirCrack-ng and other tools

30
Q

Wi-Fi Protected Access (WPA)

A

▪ Replaced WEP and its weaknesses
▪ Temporal Key Integrity Protocol (TKIP)
● 48-bit Initialization Vector (IV) instead of 24-bit IV
● Rivest Cipher 4 (RC4) used for encryption
▪ Uses Message Integrity Check (MIC)
● Confirms data was not modified in transit
▪ Enterprise Mode WPA
● Users can be required to authenticate before exchanging keys
● Keys between client and AP are temporary

31
Q

Wi-Fi Protected Access 2 (WPA2)

A

▪ Created as part of IEEE 802.11i standard
● Requires stronger encryption and integrity checks
● Integrity checking through CCMP
o Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
▪ Uses Advanced Encryption Standard (AES)
● 128-bit key or above
▪ Supports two modes
● Personal mode with pre-shared keys
● Enterprise mode with centralized authentication

32
Q

WiFi Exam Tips

A
If you are asked about / Look for the answer with:
Open = No security or protection 
WEP = IV
WPA = TKIP and RC4
WPA2 = CCMP and AES
33
Q

WiFi Exam Tips

A
If you are asked about / Look for the answer with:
Open = No security or protection 
WEP = IV
WPA = TKIP and RC4
WPA2 = CCMP and AES
34
Q

WEP and WPA/WPA2 Security Cracking

A

▪ Utilities can capture wireless packets and run mathematical algorithms to determine the pre-shared key

35
Q

Network Authentication 802.1x

A

▪ Each wireless user authenticates with their own credentials
▪ Used also in wired networks

36
Q

Extensible Authentication Protocol (EAP)

A
▪ Authentication performed using 802.1x
▪ EAP-FAST
● Flexible Authentication via Secure Tunneling
▪ EAP-MD5
▪ EAP-TLS
37
Q

MAC Address Filtering

A

▪ Configures an AP with a listing of permitted MAC addresses (like an ACL)
▪ Problems:
● Knowledgeable users can falsify their MAC easily using freely available tools
● Examples:
o MAC Address Changer (Windows)
o MacDaddyX (OSX)
o Macchanger (Linux)

38
Q

Network Admission Control (NAC)

A

▪ Permits or denies access to the network based on characteristics of the device instead of checking user credentials
▪ Conducts a posture assessment of client
● Checks the OS and antivirus version of client

39
Q

Captive Portals

A

▪ Web page that appears before the user is able to access the network resources
▪ Webpage accepts the credentials of the user and presents them to the authentication server

40
Q

Geofencing

A

▪ GPS or RFID defines real-world boundaries
▪ Barriers can be active or passive
▪ Device can send alerts if it leaves area
▪ Network authentication can use it to determine access

41
Q

Disable SSID Broadcast

A

▪ Configures an AP to not broadcast the name of the wireless LAN
▪ Problem:
● Knowledgeable users can still easily find the SSID using wireless sniffing tools

42
Q

Rogue Access Point

A

▪ Malicious users set up an AP to lure legitimate users to connect to the AP
▪ Malicious users can then capture all the packets (data) going through the rogue access point

43
Q

Unsecured Wireless Networks

A

▪ War Driving
● Occurs when users perform reconnaissance looking for unsecured wireless networks
▪ War Chalking
● Occurs when users write symbols on a wall to notify others of AP characteristics