Wireless Security Flashcards
Wireless clients identify an AP by it’s IP address, TRUE or FALSE?
FALSE. They identify by the SSID
What feature of wireless LAN control protocols help detect rogue APs?
The WLAN controller protocols (LWAPP and CAPWAP) use Radio Resource Management that checks for rogue activity
How does Cisco Unified Wireless Network help to defend against unauthorized access to the corporate LAN through insecure ad-hoc networks?
It sends out DEAUTHENTICATION frames to stop ad hoc association
How can Management Frame Protection protect from DoS attacks on the wireless network?
Because DoS attacks use association frames to flood the network, and those frames are classed as management frames, MFP can prevent the deluge
How do wireless LAN DoS attacks typically work?
By flooding the network with deauthentication or disassociation frames to remove hosts from their networks
In infrastructure mode, what does an AP do when it receives an MFP protected frame from an unknown SSID?
It queries the controller for the key. If the BSSID isn’t in recognized by the controller it will drop the frame.
Describe the difference between and IDS and IPS
1) IDS purely detects malicious behaviours
2) An IPS will detect and block malicious behaviours
What is open authentication?
authenticating by supplying the SSID
Why isn’t WEP used in today’s VLANs
Because it sends the challenge in clear-text
Which networking access protocol is required under 802.1x to authenticate credentials for WPA/WPA2 Enterprise
RADIUS (Remote Authentication Dial-In User Service)
802.1x provides AAA services, true or false?
True
Once RADIUS authenticates, what does it allow us to do with those connections?
1) Specify the type of rights a user has
2) Control what they can do on the network
3) Records all access attempts and actions
Which two groups created Temporal Key Integrity Protocol?
802.11i and the Wi-Fi Alliance
What’s the difference between WPA and WPA2?
WPA2 uses the stronger AES-CCMP encryption
What is the PSK and how is it used by TKIP and AES?
Pre-Shared Key. It verifies users on an AP using a passphrase (i.e. the wifi password). The PSK also provides keying material for TKIP and AES to generate keys for each packet transmitted.
What 3 things are wireless packet keys made up of?
1) base key
2) transmitting device’s MAC address
3) packet’s serial number
What encryption alogorithm does TKIP use?
RC4
What’s the difference between WEP and TKIP transmitted packets?
WEP uses the same encryption key for each packet, TKIP encrypts a different key on each packet transmitted. (this is the Temporal part of the acronym)