wireless security facts Flashcards

1
Q

Wireless networks are everywhere. When a user connects to a wireless network, the expectation is that the connection is secure and the data is protected. Because the wireless signal is an unbounded medium, anyone can intercept the data if it is not properly secured. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user must first be _____ before connecting to the wireless network.

A

authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

is the process of proving the user’s identity and proving that the user is allowed to be on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is a passphrase a user enters to access the wireless network. This is probably the most commonly used access method.

A

A pre-shared key (psk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wi-Fi Protected Setup (WPS)

A

works only on a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPS allows a device to securely connect to a wireless network without entering the PSK. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To connect to a device on a wifi protected setup:

A

-You first press the button on the access point that initiates a search for devices in range.
-The connecting device may have a WPS button that will automatically join it to the access point.
-If there is no button, you enter (on the device) the eight-digit pin unique to the access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Some devices and access points can also use NFC during the WPS process to connect to each other.

A

facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

open network

A

-has no authentication
-It allows anyone to connect to the network.
-This access method should be used only in public places that want to offer free wireless access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Many open networks implement a _____.

A

captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After a device connects to the wireless network but before it can access the internet, the user is redirected to a _____.

A

captive portal page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Captive Portal)
The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Enterprise level networks need a high level of security. Many enterprise networks use the _____ protocol to authenticate users to the wireless network.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a standard for local area networks created by The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA). This standard is often labeled IEEE _____.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On a wired network, user authentication activates the port the user is connected to. If the user activation fails, the port remains off. You implement the 802.1x protocol in a wireless network by enabling a virtual port when the user is authenticated.

A

facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

There are three components in a wireless 802.1x setup:

A

1) Supplicant – The wireless client.
2) Authenticator – This device responsible for handling the communications between the supplicant and authentication server.
3) Authentication server – The server that contains the centralized database for user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.1x implementations on wireless networks often use _____.

A

Remote Authentication Dial-In Service (RADIUS).

18
Q

Remote Authentication Dial-In Service (RADIUS)

A

-started in 1991
-It was originally used to authenticate users to the remote network over a dial-up network.
-known as a triple-A protocol.
-This means it provides authentication, authorization, and accounting management.

19
Q

When using 802.1x authentication for wireless networks with RADIUS, keep in mind: (1/5)

A

A RADIUS server is required to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells and authenticate using the same account information.

20
Q

When using 802.1x authentication for wireless networks with RADIUS, keep in mind: (2/5)

A

A PKI is required for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate.

21
Q

When using 802.1x authentication for wireless networks with RADIUS, keep in mind: (3/5)

A

The wireless access point is a RADIUS client.

22
Q

When using 802.1x authentication for wireless networks with RADIUS, keep in mind: (4/5)

A

The wireless access point forwards the wireless device’s credentials to the RADIUS server for authentication.

23
Q

When using 802.1x authentication for wireless networks with RADIUS, keep in mind: (5/5)

A

A RADIUS federation is multiple RADIUS servers that communicate with each other after establishing a trust relationship. These servers may be on different networks and could span multiple organizations.

24
Q

Enabling the proper encryption protocol is perhaps the most important security setting for a wireless network. For most users, WPA2 or WPA3 will be the best option. (true/false)

A

true

25
Q

WPA2

A

-is the implementation name for wireless security that adheres to the 802.11i specifications.
- introduced in 2004 and is still heavily used in today’s networks.

26
Q

There are two version of WPA2 available:

A

-WPA2-Personal
-WPA2-Enterprise

27
Q
  • Also known as WPA2-PSK
  • This version uses a pre-shared key (passphrase) to protect the network.
A

WPA2-Personal

28
Q

WPA2-PSK uses Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code (AES-CCMP) to encrypt all data. (true/false)

A

true

29
Q

_____ is the encryption algorithm

A

AES

30
Q

_____ uses a 128-bit key and a 128-bit block size.

A

AES-CCMP

31
Q

When a device connects to the access point, a 4-way handshake occurs to authenticate the device.
The process uses the pre-shared key and SSID to generate a session key during this process.
The handshake does have some vulnerabilities that a hacker can use to intercept the data and perform offline password attacks against.

A

facts

32
Q

This version uses a RADIUS server to authenticate users to the network.

A

WPA2-Enterprise

33
Q

_____ was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.

A

WPA3

34
Q

Instead of using the pre-shared key, WPA 3 implements the Simultaneous Authentication of Equals (SAE) standard. (true/false)

A

true

35
Q

_____ uses a 128-bit key and perfect forward secrecy to authenticate users (WPA-3)

A

SAE

36
Q

Perfect forward secrecy

A

-is a cryptography method that generates a new key for every transmission.
-This makes the handshake much more secure from hackers.
-If any portion of the handshake is intercepted, the key is still unable to be cracked.

37
Q

Additional security measures you can set up on all wireless networks include: (1/5)

A

Change the default username and password for the wireless access point.
The default username and passwords for many wireless access points are readily available on the internet.
A potential attacker will typically attempt to use these credentials first.

38
Q

Additional security measures you can set up on all wireless networks include: (2/5)

A

Disabling the SSID broadcast will help hide the network from the casual observer. A potential attacker can still easily discover the SSID, but disabling the SSID broadcast creates an extra step.

39
Q

Additional security measures you can set up on all wireless networks include: (3/5)

A

-Enable MAC address filtering.
-This setting allows access only to devices with the specified MAC addresses.
-A potential attacker is still able to intercept the signal and identify the MAC address of an allowed device and then spoof that MAC address to gain access.
-However, enabling MAC address filtering creates an additional barrier for the attacker.

40
Q

Additional security measures you can set up on all wireless networks include: (4/5)

A

-Update the wireless access point firmware.
-As security threats become known, manufacturers often release fixes to address known issues to prevent attacks.

41
Q

Additional security measures you can set up on all wireless networks include: (5/5)

A

Enable and properly configure the firewall. The firewall will help in stopping an attacker from gaining access through open ports.

42
Q

While there is no one definitive method to secure a wireless network, implementing multiple security measures make it more difficult for an attacker to gain access.

A

facts