WLAN Security Flashcards

1
Q

802.11 Security Basics?

A

Data Privacy
Authentication, Authorization, And Accounting
Segmentation
Monitoring and Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Privacy?

A

Encryption

  • RC4 Cipher
  • AES (Advanced Encryption Standard)

MAC Service Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(AAA)?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication?

A

Identify and Credential Verification, who and what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization?

A

Granting Access,

What can you do?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accounting?

A

Tracking the use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rule of AAA?

A

Authentication is required before association and authorization can be allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Segmentation?

A

Based Upon Traffic Type
Based Upon Client Type
Based Upon Authentication or Authorization

LANs
WANs
VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Monitoring

A

Monitoring gives vision into Network performance and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Monitoring may use?

A

WIDS

WIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policy?

A

Policy defines how computer systems must be implemented

  • Specific WiFi policies must be created
  • Traditional wired policies are not sufficient
  • Should be written and adaptable as technology changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Legacy 802.11 Security?

A

Allows legacy client access
Uses older security measures
Is specified in the 802.11 standard as amended
Can be the weak spot of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Security of 802.11

A

Legacy Authentication
Static WEP Encryption
MAC Filters
SSID Cloaking/Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legacy Authentication?

A
Open system or shared key authentication
Wired Equivalent Privacy
Pre-shared keys
Weak when compared to more modern methods
Still used for legacy devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Open System Authentication?

A

Two way exchange between the client radio and the access point

  • The client sends and authentication request
  • The access point then sends an authentication response

Does not require any credential
Anybody can have association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shared Key Authentication?

A

Four-way authentication frame handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Four-Way authentication frame handshake?

A

The client station sends an authentication request to the access point
The access point sends a cleartext challenge to the client station in an authentication response
The client station encrypts the cleartext challenge and sends it back to the access point in the body of another authentication request frame.
The access point decrypts the station’s response and compares it to the challenge text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static WEP Encryption?

A

Uses a 24bit Initialization Vector

Can use either a 40 bit or 104 bit encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WEP Provides?

A

Data Integrity
Confidentiality
Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Integrity?

A

A data integrity checksum known as the integrity check value is computed on a data before encryption and used to prevent data from being modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Confidentiality?

A

The primary goal of confidentiality was to provide data privacy by encrypting the data before transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access Control?

A

For WEP this is a crude form of authorization
Client stations that do not have the same matching static WEP key as an access point are refused to access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WEP Encryption Process?

A

RC4 - Rivest Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

WEP Weaknesses?

A

IV Collisions Attack
Weak Key Attack
Reinjection Attack
Bit-flipping Attack

Easily cracked using freeware
Not allowed in CDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Other Security Measures?

A

MAC Filters
SSID Cloaking
In and of themselves these measures are not sufficient
Can be a part of a layered approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

MAC Filters?

A

Block or Allow clients based upon MAC Address
Easily Bypassed through spoofing
Time consuming to implement
Does not scale well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SSID Cloaking?

A

Removes the SSID from Beacon frames
Does not stop the SSID from being used in the other frames
May cause Roaming problems
Forces the use of Active scanning in the service set

28
Q

Robust Security Network?

A

Two stations must authenticate and associate with each other

Create dynamic encryption keys through a process known at the 4-way Handshake

29
Q

Components of RSN?

A
Authentication and Authorization
802.1x/EAP Framework
Dynamic Encryption Key Generation
4-Way Handshake
WPA/WPA2-Personal
TKIP Encryption
CCMP Encryption
30
Q

Authentication And Authorization?

A

Identity/Credential Verification

  • Part of AAA
  • Grants Access to network and or resources

Pre-shared key authentication (personal)
- No need for external database

Server-based authentication

  • Required AAA server
  • May require directory access database server
31
Q

PSK Authorization?

A

Standard defines Authentication and Key Management services

32
Q

During 802.1X authentication, an authentication and key management protocol can be either?

A
A preshared (PSK) protocol
An EAP protocol
33
Q

Name marketing names for PSK authentication?

A

WPA/WPA2-Passphrase
WPA/WPA2-PSK
WPA/WPA2-Preshared Key

34
Q

802.1X/EAP Framework

A

Based on EAP

Supports Mutiple EAP Types

35
Q

EAP?

A

Extensible Authentication Protocol

Port Based Access Control

36
Q

Three Main Components?

A

Supplicant
Authenticator
Authentication Server

37
Q

TKIP?

A

Temporal Key Integrity Protocol

38
Q

TKIP Encryption?

A
Optional encryption for an RSN
Use constitutes a Legacy RSN
Uses a 48 bit Initialization vector
Uses the MIC
Adds 20 bits of Overhead to frames
39
Q

MIC?

A

Message Integrity Check

40
Q

CCMP?

A

Counter-Mode (CM) with Cipher Block Chaining (CBC) Message Authentication Code (MAC) Protocol

41
Q

CCMP Encryption?

A
Required for an 802.11 RSN
Uses the Rijndael algorithm
Uses an 8 byte MIC
Stronger than TKIP
Requires more robust chipset to function
42
Q

Traffic Segmentation?

A

VLANs

  • Guest
  • Voice
  • Data

RBAC

43
Q

RBAC?

A

Role-Based Access Control

44
Q

Role Based Access Control?

A

Is an approach to restricting system access to authorized users.

45
Q

3 Main components of an RBAC?

A

Users
Roles
Permissions

46
Q

RBAC Permissions can be defined as?

A

Layer 2 permissions
Layer 3 permissions
Layer 4-7 permissions
Bandwidth permissions

47
Q

Layer 2 permissions?

A

MAC Filters

48
Q

Layer 3 permissions?

A

Access control lists

49
Q

Layers 4-7 permissions?

A

Stateful firewall rules

50
Q

VPN Wireless Security?

A

Protocols

Encryption

51
Q

Protocols of VPN?

A

Point to Point Tunneling Protocol

Layer L2 Tunneling Protocol

52
Q

Encryption of VPN?

A

Microsoft Point-To-Point Encryption

Internet Protocol Security

53
Q

Guest WLAN Security?

A

Guest SSID
Guest VLAN
Firewall Policy
Captive Web Portal

54
Q

Guest SSID?

A

Multiple corporate SSIDs are broadcasted by the company APs along with a guest SSID

55
Q

Guest VLAN?

A

Guest traffic is usually segmented from corporate user traffic in a unique VLAN tied to a unique guest subnet

Guest traffic is often also routed to a demilitarized zone

56
Q

e.g. MCAT, pharma, bar exam, Spanish, Series 7
Dismiss Search Bar
Search

Flashcards in “WLAN Security”
Firewall Policy?

A

Guest users are not allowed on private networks because corporate network servers and resources usually reside on the private IP space

57
Q

Captive Web Portal?

A

Guest users must normally log in through a captive web portal page before they can proceed to the Internet

58
Q

Wireless Security Management?

A

Wireless Attacks
Intrusion Monitoring
Security Policy

59
Q

Wireless Attacks?

A
Rogue Wireless Devices
Peer-To-Peer Attacks
Eavesdropping
Encryption Cracking
Authentication Attacks
MAC Spoofing.
...
60
Q

Rogue Wireless Devices?

A

Unsanctioned Devices on the Sanctioned Network
Located Behind Firewalls
Growing Risk
ESS or IBSS Devices

61
Q

Intrusion Monitoring?

A

Wireless Intrusion Detection System
Wireless Intrusion Prevention System
Mobile WIDS/WIPS
Spectrum Analysis

62
Q

Wireless Intrusion Detection?

A
Server uses:
signature analysis
protocol analysis
behavior analysis
rf spectrum analysis
63
Q

Wireless Security Policy?

A

General Security Policy
Functional Security Policy
Legislative Compliance
Industry Compliance

64
Q

General Security Policy?

A
Statement of Authority
Appliance Audience
Violation Reporting Procedures
Risk Assessment and Threat Analysis
Security Auditing
65
Q

Functional Security Policy?

A

Policy Essentials
Baseline Practices
Design and Implementation
Monitoring and Response