wireless security facts Flashcards
Wireless networks are everywhere. When a user connects to a wireless network, the expectation is that the connection is secure and the data is protected. Because the wireless signal is an unbounded medium, anyone can intercept the data if it is not properly secured. (true/false)
true
A user must first be _____ before connecting to the wireless network.
authenticated
Authentication
is the process of proving the user’s identity and proving that the user is allowed to be on the network.
_____ is a passphrase a user enters to access the wireless network. This is probably the most commonly used access method.
A pre-shared key (psk)
Wi-Fi Protected Setup (WPS)
works only on a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3).
WPS allows a device to securely connect to a wireless network without entering the PSK. (true/false)
true
To connect to a device on a wifi protected setup:
-You first press the button on the access point that initiates a search for devices in range.
-The connecting device may have a WPS button that will automatically join it to the access point.
-If there is no button, you enter (on the device) the eight-digit pin unique to the access point.
Some devices and access points can also use NFC during the WPS process to connect to each other.
facts
open network
-has no authentication
-It allows anyone to connect to the network.
-This access method should be used only in public places that want to offer free wireless access
Many open networks implement a _____.
captive portal
After a device connects to the wireless network but before it can access the internet, the user is redirected to a _____.
captive portal page.
(Captive Portal)
The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access. (true/false)
true
Enterprise level networks need a high level of security. Many enterprise networks use the _____ protocol to authenticate users to the wireless network.
802.1x
_____ is a standard for local area networks created by The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA). This standard is often labeled IEEE _____.
802.1x
On a wired network, user authentication activates the port the user is connected to. If the user activation fails, the port remains off. You implement the 802.1x protocol in a wireless network by enabling a virtual port when the user is authenticated.
facts
There are three components in a wireless 802.1x setup:
1) Supplicant – The wireless client.
2) Authenticator – This device responsible for handling the communications between the supplicant and authentication server.
3) Authentication server – The server that contains the centralized database for user authentication.