10a-Wireless Security Flashcards

1
Q

What is the basic building block of an 802.11 WLAN?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List and briefly define IEEE 802.11 services.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between TKIP and CCMP?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In IEEE 802.11, open system authentication simply consists of two communications. An authentication is requested by the client, which contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client’s MAC address is explicitly excluded in the AP/router configuration.

a) What are the benefits of this authentication scheme?
b) What are the security vulnerabilities of this authentication scheme?

A

a) It can block a list of pre-existing mac addresses.

b) It is still vulnerable to ARP-cache poisoning. (there’s more)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A potential weakness of the CRC as an integrity check is that it is a linear function. This means that you can predict which bits of the CRC are changed if a single bit of the message is changed. Furthermore, it is possible to determine which combination of bits could be flipped in the message so that the net result is no change in the CRC. Thus, there are a number of combinations of bit flippings of the plaintext message that leave the CRC unchanged, so message integrity is defeated. However, in WEP, if an attacker does not know the encryption key, the attacker does not have access to the plaintext, only to the ciphertext block. Does this mean that the ICV is protected from the bit flipping attack? Explain.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Present an overview of security threats and countermeasures for wireless networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the unique security threats posed by the use of mobile devices with enterprise networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the principal elements in a mobile device security strategy.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the essential elements of the IEEE 802.11 wireless LAN standard?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Summarize the various components of the IEEE 802.11i wireless LAN security architecture.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly