Wireless Security Flashcards

1
Q

Why is security even more important in wireless networks?

A

Since signals aren’t contained within a wire, any device within range of the signal can receive traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While in wired networks, traffic is generally only encrypted when sent over an untrusted network and not within the LAN, what is the case with wireless networks?

A

Traffic sent between wireless clients and APs should be encrypted as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: Ideally, clients should also authenticate the AP to avoid associating with a malicious AP

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In addition to a unique encryption/decryption key used between the AP and each client, there is also a _____ for broadcast messages.

A

Group key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To help protect message integrity, a ______ is added to wireless messages

A

MIC

Message Integrity Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is a MIC used to ensure message integrity is preserved?

A

Sender calculates a MIC for a message. When recipient decrypts the message, it calculated the MIC independently. If the calculated MIC is not equal to the MIC included in the message, it is discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the most common wireless authentication methods?

A
  • Open Authentication
  • WEP (Wired Equivalent Privacy)
  • EAP (Extensible Authentication Protocol)
  • LEAP (Lightweight EAP)
  • EAP-FAST (EAP Flexible Authentication via Secure Tunneling)
  • PEAP (Protected EAP)
  • EAP-TLS (EAP Transport Layer Security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the wireless authentication method Open Authentication

A

Client sends auth request, AP accepts it. No questions asked.

Often used in conjecture with another auth method, e.g. airline wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the wireless authentication method WEP

A

Provided both authentication and RC4 encryption of traffic. Shared key protocol. Not secure and can be easily cracked. Don’t use.

AP sends challenge phrase using WEP key, client encrypts it and sends back. If decrypted client message matches, then AP knows client has correct shared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP and its different variations are all defined in IEEE ______

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IEEE 802.1x provides:

A

port-based network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In 802.1x, the device that wants to connect to the network is called the:

A

Supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In 802.1x, the device that provides access to the network is called the:

A

Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In 802.1x, the device that receives client credentials and permits/denies access is called the:

A

Authentication Server

Typically a RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In LEAP, clients must provide a _____ and a _____ to authenticate

A

username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In LEAP, both the client and the AP send a _____ to eachother

A

Challenge phrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In LEAP, _____ aer used, meaning that the WEP keys are changed frequently

A

Dynamic WEP keys

18
Q

T/F: LEAP is just as vulnerable as WEP and should not be used anymore

A

T

19
Q

EAP-FAST consists of three phases:

A
  1. PAC (Protected Access Credential) is generated and passed from the server to the client
  2. A secure TLS tunnel is established between the client and the server
  3. Inside of the TLS tunnel, the client and the server communciate further to authenticate the client
20
Q

Compare and contrast EAP-FAST and PEAP

A

Instead of a PAC, in PEAP the server uses a digital certificate. Client uses the cert to authenticate the server. Cert is also used to establish a TLS tunnel, and client is then authenticated in the secure tunnel.

Both EAP-FAST and PEAP involve establishing a secure tunnel between the client and the device, and then authenticating the client within the tunnel

21
Q

EAP-TLS requires a certificate on ______

A

The AS and on every single client

22
Q

What is a drawback of EAP-TLS

A

While it is the most secure, it is the most difficult to implement

23
Q

T/F: EAP-TLS doesn’t authenticate clients within a TLS tunnel

A

T

A TLS tunnel is used to exchange encryption key info, but since both the client and the server authenticate each other with digital certificates, the tunnel doesn’t need to be used for authenticating the client

24
Q

What are the three encryption and integrity methods discussed?

A
  • TKIP (Temporal Key Integrity Protocol)
  • CCMP (Counter/CBC-MAC Protocol)
  • GCMP
25
Q

Describe TKIP

A

Temporal Key Integrity Protocol

A temporary solution based on WEP until a new standard and new hardware could be built.

TKIP is essentially a more secure version of WEP.

26
Q

Describe CCMP

A

Counter/CBC-MAC Protocol

Used in WPA2. Had to be supported by hardware. Consists of two different algorithms to provide encryption:
- AES used for encryption, most secure protocol currently available
- CBC-MAC used as a MIC for ensuring integrity

27
Q

Describe GCMP

A

Galois/Counter Mode Protocol

Used in WPA3. More secure and efficient than CCMP. Two different algorithms used:
- AES counter mode encryption
- GMAC (Galois Message Authentication Code) used as a MIC for ensuring integrity

28
Q

What are the two authentication modes used in WPA authentication

A
  • Personal Mode: A pre-shared key (PSK) is used for authentication. Common for home networks. PSK is not sent over the air, 4-way handshake is used for authentication, PSK is used to generate encryption keys
  • Enterprise Mode: 802.1x is used with an authentication server (RADIUS, etc). No specific EAP method is specified, so all are supported
29
Q

WPA includes what protocols?

A
  • TKIP
  • 802.1x or PSK
30
Q

WPA2 includes what protocols?

A
  • CCMP
  • 802.1x or PSK
31
Q

WPA3 includes what protocols?

A
  • GCMP
  • 802.1x or PSK
32
Q

What are some new features of WPA3?

A
  • PMF (Protected Management Frames), prevents 802.11 management frames from eavesdropping/forging.
  • SAE (Simultaneous Authentication of Equals), protects 4-way handshake when using personal auth mode
  • Forward Security: prevents data from being decrypted after transmitted over the air. Attackers can’t capture wireless frames and try and decrypt them later
33
Q

What does GMAC provide to a secure wireless connection?

a) Encryption
b) MIC
c) Authentication
d) Authorization

A

b) MIC

34
Q

Which of the following are part of the 802.1x authentication architecture (pick 3)?

a) Supplicant
b) Verifier
c) Authentication host
d) Authenticator
e) Authentication server

A

a) Supplicant
d) Authenticator
e) Authentication server

35
Q

Which of the following encryption/integrity methods is considered most secure?

a) WEP
b) TKIP
c) GCMP
d) CCMP

A

c) GCMP

Part of WPA3 and newest

36
Q

Which of the following AES methods requires a certificate on both the supplicant and the AS?

a) EAP-FAST
b) LEAP
c) PEAP
d) EAP-TLS

A

d) EAP-TLS

37
Q

Which of the following WPA3 security features protects the 4-way handshake when using personal authentication mode?

a) SAE
b) Forward Security
c) AES
d) PMF

A

a) SAE

38
Q

Which of the following is used by WEP to provide encryption?

a) GCMP
b) RC4
c) CCMP
d) AES
e) TKIP

A

b) RC4

39
Q

Describe the AAA override feature on a Cisco WLC

A

Can be used to configure VLAN tagging, QoS, and ACLs to individual clients based on RADIUS attributes

40
Q

When configuring security on a new WLAN by using a Cisco WLC’s GUI, what security settings are you most likely to configure by using the L3 Security drop down list box on the L3 tab?

A

VPN Pass-Through

41
Q

The VPN pass-through setting is only available when you are configuring a _____

A

WLAN

42
Q

To minimize the amount of time it takes an 802.1x client to roam between access points, which L2 security method should be used?

A

802.1x + CCKM

Normally, 802.1x clients need to reauthenticate with each AP they are roaming between. Using 802.1x + CCKM key management eliminated the need to reauthenticate with the RADIUS server, reducing roam time.