Wireless Security Flashcards

1
Q

Wireless clients identify an AP by it’s IP address, TRUE or FALSE?

A

FALSE. They identify by the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What feature of wireless LAN control protocols help detect rogue APs?

A

The WLAN controller protocols (LWAPP and CAPWAP) use Radio Resource Management that checks for rogue activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Cisco Unified Wireless Network help to defend against unauthorized access to the corporate LAN through insecure ad-hoc networks?

A

It sends out DEAUTHENTICATION frames to stop ad hoc association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can Management Frame Protection protect from DoS attacks on the wireless network?

A

Because DoS attacks use association frames to flood the network, and those frames are classed as management frames, MFP can prevent the deluge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do wireless LAN DoS attacks typically work?

A

By flooding the network with deauthentication or disassociation frames to remove hosts from their networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In infrastructure mode, what does an AP do when it receives an MFP protected frame from an unknown SSID?

A

It queries the controller for the key. If the BSSID isn’t in recognized by the controller it will drop the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the difference between and IDS and IPS

A

1) IDS purely detects malicious behaviours

2) An IPS will detect and block malicious behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is open authentication?

A

authenticating by supplying the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why isn’t WEP used in today’s VLANs

A

Because it sends the challenge in clear-text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which networking access protocol is required under 802.1x to authenticate credentials for WPA/WPA2 Enterprise

A

RADIUS (Remote Authentication Dial-In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.1x provides AAA services, true or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Once RADIUS authenticates, what does it allow us to do with those connections?

A

1) Specify the type of rights a user has
2) Control what they can do on the network
3) Records all access attempts and actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two groups created Temporal Key Integrity Protocol?

A

802.11i and the Wi-Fi Alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the difference between WPA and WPA2?

A

WPA2 uses the stronger AES-CCMP encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the PSK and how is it used by TKIP and AES?

A

Pre-Shared Key. It verifies users on an AP using a passphrase (i.e. the wifi password). The PSK also provides keying material for TKIP and AES to generate keys for each packet transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What 3 things are wireless packet keys made up of?

A

1) base key
2) transmitting device’s MAC address
3) packet’s serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What encryption alogorithm does TKIP use?

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s the difference between WEP and TKIP transmitted packets?

A

WEP uses the same encryption key for each packet, TKIP encrypts a different key on each packet transmitted. (this is the Temporal part of the acronym)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are nonces and what part of a packet key uses it?

A

Nonces are an assortment of random numbers gleaned from the workstation. They’re used to construct the base key.

20
Q

How long is the encryption key used in TKIP and AES-CCMP?

A

TKIP - 128

AES - 256

21
Q

What key feature makes TKIP more secure than WEP?

A

It changes the key for each packet

22
Q

List in order from most secure 4 wireless security options

A

1) WPA2-PSK/AES
2) WPA2-PSK/TKIP
3) WPA-PSK/AES (mostly redundant option)
4) WPA-PSK/TKIP

23
Q

Which security protocol should ideally be disabled to prevent hackers gaining the PSK for WPA or WPA2?

A

Wi-Fi Protected Setup

24
Q

What is the most secure form of authentication and authorization on a WLAN?

A

WPA2 using Extensible Authentication Protocol to use security certificates to identify devices connecting to the AP

25
Q

What do you need implemented to use EAP and certificates to authenticate devices?

A

Public Key Infrastructure (Server that issues certificates)

26
Q

List the more secure versions of Extensible Authentication Protocol with most secure first.

A

1) EAP-TLS (Transport Layer Security) (hardest to implement)
2 EAP-FAST (Flexible Authentication via Secure Tunneling)
3) PEAP

27
Q

You’re configuring PEAP, where do you need to install the PKI certificate?

A

Server only

28
Q

EAP-TLS needs certificate only on the server side, TRUE or FALSE?

A

FALSE, both server and client require certificates installed

29
Q

TKIP uses what two things to seed the RC4 algorithm?

A

1) MAC address

2) Initialization Vector

30
Q

TKIP works with Message Integrity Checks to check the integrity of messages received at the access point. How many MIC CRCs need to fail and within what timer frame and then what happens if they do?

A

2 or more fail
Within 60 seconds
AP requires TKIP to rekey the RC4 seed value

31
Q

CCMP stands for?

A

Counter Cipher Mode with Block Chaining Message Authentication Code

32
Q

Which wireless security standard was deprecated in 2006?

A

WPA

33
Q

What’s the difference between personal mode and enterprise mode?

A

Authentication method.
Personal mode is for home use and uses a PSK
Enterprise mode is for organizations that can use 802.1x methods to authenticate.

34
Q

EAP-Flexible Authentication via Secure Tunnelling replaced Cisco’s LEAP - TRUE or FALSE

A

TRUE

35
Q

EAP-FASTs 3 phases involve what

A

Phase 0 - shared secret (like a key/passphrase) agreed
Phase 1 - secure tunnel established
Phase 2 - Authentication occurs

36
Q

Which version of EAP is an open standard and was defined by the IETF?

A

EAP-TLS

37
Q

Which EAP method underpins WPA and WPA2 enterprise authentication?

A

EAP-TLS

38
Q

Why is EAP-TLS harder to manage/implement?

A

Because it requires certificates on both client and server side

39
Q

Which type of EAP that uses TLS comes built in for support on Windows operating systems?

A

PEAP

40
Q

Which TLS enabled EAP protocol uses two phases where:
PHASE 1 - establishes an ‘outer’ secure tunnel using EAP-TLS to authenticate the server
PHASE 2 - using an ‘inner’ tunnel to authenticate the client e.g. using EAP-MS-CHAPv2

A

PEAP

41
Q

What is the bit-length of the WPA pre-shared key (not the encryption)?

A

256-bit

42
Q

EAP was designed to provide an authentication framework for point-to-point connections and wireless connections - true or false?

A

TRUE

43
Q

What is the name of the framework who’s purpose is to provide a secure way of transferring keying material and associated parameters for many types of authentication mechanisms?

A

EAP

44
Q

Which EAP method was developed by Cisco and is widely adopted on 3rd party network vendors? What is the major draw back?

A

Lightweight-EAP

It uses MS-CHAP which isn’t a very secure way of transferring user credentials

45
Q

What are the two AP control protocols?

A
*LWAPP = Lightweight Access Point Protocol, Cisco
CAPWAP = Control and Provisioning of Wireless Access Points
46
Q

What is the term used to describe when Access Points split duties between ones running a lightweight operating system and a controller?

A

Split MAC

47
Q

Which 2 main EAP implementations use tunnelling?

A

PEAP

EAP-FAST