Wireless Security Flashcards

1
Q

What wireless encryption scheme is the most secure?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which wireless security protocol is known for its vulnerability resulting from implementation flaws?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which wireless security protocol is known for its vulnerability resulting from implementation flaws?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the cryptographic algorithms is the least vulnerable to attacks?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What encryption schemes is used in WiFi Protected Access 2 (WPA2)?

A

AES CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of

A

AES GCMP, AES CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Client authentication method used in WPA2 Personal mode?

A

PSK Pre Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Omnidirectional Antenna?

A

wireless antenna type provides a 360-degree horizontal signal coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would help in troubleshooting wireless signal loss and low wireless network signal coverage?

A

WAP power level controls, WiFi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

A

Channel overlapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a WiFi analyzer

A

diagnostic tool that can be used for measuring wireless signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An administrator needs to adjust the placement of multiple Access Points (APs) to ensure the best wireless signal coverage for the network. What would be of help while identifying areas of low signal strength?

A

Heat map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

A

Wireless site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Captive Portal?

A

allows administrators to block network access for users until they perform required action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network usually by the press of a button:

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristic features of WPA2/WPA3 Enterprise mode?

A
  • Suitable for large corporate networks
  • IEEE 802.1x
  • Requires RADIUS authentication server
17
Q

What would be the best solution for securing a small network that lacks an authentication server?

A

WPA3 SAE

18
Q

IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

A

IEEE 802.1x

19
Q

Which of the EAP methods relies on client-side and server-side certificates for authentication and offers the highest level of security?

A

EAP-TLS

20
Q

What is EAP?

A

Extensible Authentication Protocol - authentication framework used in wireless networks.

EAP provides an authentication framework, not a specific authentication mechanism.

21
Q

What is SAE?

A

Simultaneous Authentication of Equals - used for client authentication in WPA3 personal mode. Best for securing small networks without an authentication server

22
Q

What is PSK ?

A

Pre Shared Key - used for client authentication in WPA2 personal mode. Same encryption key is used by the access point and the client

23
Q

What is WEP?

A

Wired Equivalent Privacy - Original 802.11 wireless security standard that claims to be as secure as a wired network. Weakness is it’s 24 bit initialization vector. Outdated and not secure

24
Q

What is a rogue access point?

A

Unauthorized wireless access point or wireless router that allows access to the secure network

25
Q

What is an evil twin?

A

Rogue counterfeit and unauthorized wap with the same SID as your valid one

26
Q

What is SSID?

A

Service Set Identifier - uniquely identifies the network and is the name of the wireless access point (WAP) used by the clients. Should be disabled for security

27
Q

What is WPA?

A

Wifi Protected Access - replacement for WEP using TKIP and RC4 encryption

28
Q

What is blue jacking?

A

sending unsolicited data across bluetooth

29
Q

What is blue snarfing ?

A

Taking data via bluetooth