12.7_Secure WLANS Flashcards

1
Q

To address the threats of keeping wireless intruders out and protecting data, two early security features were used and are still available on most routers and APs:

A

SSID cloaking
MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

APs and some wireless routers allow the SSID beacon frame to be disabled, as shown in the figure. Wireless clients must manually configure the SSID to connect to the network. What method is this?

A

SSID Cloaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An administrator can manually permit or deny clients wireless access based on their physical MAC hardware address. In the figure, the router is configured to permit two MAC addresses. Devices with different MAC addresses will not be able to join the 2.4GHz WLAN. What method is this?

A

MAC Addresses Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False
Although these two features would deter most users, the reality is that neither SSID cloaking nor MAC address filtering would deter a crafty intruder.

A

True
SSIDs are easily discovered even if APs do not broadcast them and MAC addresses can be spoofed. The best way to secure a wireless network is to use authentication and encryption systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two types of authentication were introduced with the original 802.11 standard:

__: Any wireless client should easily be able to connect and should only be used in situations where security is of no concern, such as those providing free internet access like cafes, hotels, and in remote areas. The wireless client is responsible for providing security such as using a virtual private network (VPN) to connect securely. VPNs provide authentication and encryption services. VPNs are beyond the scope of this topic.

A

Open system authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two types of authentication were introduced with the original 802.11 standard:
___: Provides mechanisms, such as WEP, WPA, WPA2, and WPA3 to authenticate and encrypt data between a wireless client and AP. However, the password must be pre-shared between both parties to connect.

A

Shared key authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are four shared key authentication techniques available:
____: The original 802.11 specification designed to secure the data using the Rivest Cipher 4 (RC4) encryption method with a static key. However, the key never changes when exchanging packets. This makes it easy to hack. WEP is no longer recommended and should never be used.

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are four shared key authentication techniques available:
__: A Wi-Fi Alliance standard that uses WEP, but secures the data with the much stronger Temporal Key Integrity Protocol (TKIP) encryption algorithm. TKIP changes the key for each packet, making it much more difficult to hack.

A

Wi-Fi Protected Areas (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are four shared key authentication techniques available:

__: the current industry standard for securing wireless networks. It uses the Advanced Encryption Standard (AES) for encryption. AES is currently considered the strongest encryption protocol.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are four shared key authentication techniques available:
___: The next generation of Wi-Fi security. All **-enabled devices use the latest security methods, disallow outdated legacy protocols, and require the use of Protected Management Frames (PMF). However, devices with WPA3 are not yet readily available.

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Home routers typically have two choices for authentication:

A

WPA and WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authenticating a Home User
__: Intended for home or small office networks, users authenticate using a pre-shared key (PSK). Wireless clients authenticate with the wireless router using a pre-shared password. No special authentication server is required.

A

Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authenticating a Home User

___: Intended for **networks but requires a___ (RADIUS) authentication server. Although more complicated to set up, it provides additional security. The device must be authenticated by the RADIUS server and then users must authenticate using 802.1X standard, which uses the Extensible Authentication Protocol (EAP) for authentication.

A

Enterprise
Remote Authentication Dial-In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false
Encryption is not used to protect data

A

False
Encryption is used to protect data. If an intruder has captured encrypted data, they would not be able to decipher it in any reasonable amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false
Encryption is not used to protect data

A

False
Encryption is used to protect data. If an intruder has captured encrypted data, they would not be able to decipher it in any reasonable amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The WPA and WPA2 standards use the following encryption protocols:
___: the encryption method used by WPA. It provides support for legacy WLAN equipment by addressing the original flaws associated with the 802.11 WEP encryption method. It makes use of WEP, but encrypts the Layer 2 payload using ***, and carries out a Message Integrity Check (MIC) in the encrypted packet to ensure the message has not been altered.

A

Temporal Key Integrity Protocol (TKIP)

16
Q

The WPA and WPA2 standards use the following encryption protocols:
____: is the encryption method used by WPA2. It is the preferred method because it is a far stronger method of encryption. It uses the Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP) that allows destination hosts to recognize if the encrypted and non-encrypted bits have been altered.

A

Advanced Encryption Standard (AES)

17
Q

Authentication in the Enterprise
The Enterprise security mode choice requires an ____ RADIUS server.

A

Authentication, Authorization, and Accounting (AAA)

18
Q

Authentication in the Enterprise
___: This is the reachable address of the RADIUS server.

A

RADIUS Server IP address

19
Q

Authentication in the Enterprise
UDP Port Numbers: Officially assigned UDP ports ___ for RADIUS Authentication, and ___for RADIUS Accounting, but can also operate using UDP ports 1645 and 1646, as shown in the figure.

A

1812
1813

20
Q

Authentication in the Enterprise
___: Used to authenticate the AP with the RADIUS server.

A

Shared Key

21
Q

WPA3 includes four features:

A

WPA3-Personal
WPA3-Enterprise
Open Networks
Internet of Things (IoT) Onboarding

22
Q

WPA3
In____, threat actors can listen in on the “handshake” between a wireless client and the AP and use a brute force attack to try and guess the PSK. WPA3-Personal thwarts this attack by using___, a feature specified in the IEEE 802.11-2016. The PSK is never exposed, making it impossible for the threat actor to guess.

A

WPA2-Personal
Simultaneous Authentication of Equals (SAE)

23
Q

WPA3
____ still uses 802.1X/EAP authentication. However, it requires the use of a 192-bit cryptographic suite and eliminates the mixing of security protocols for previous 802.11 standards. WPA3-Enterprise adheres to the Commercial National Security Algorithm (CNSA) Suite which is commonly used in high security Wi-Fi networks.

A

WPA3-Enterprise

24
Q

WPA3
OPEN NETWORKS: Open networks in WPA2 send user traffic in unauthenticated, clear text. In WPA3, open or public Wi-Fi networks still do not use any authentication. However, they do use ___ to encrypt all wireless traffic.

A

Opportunistic Wireless Encryption (OWE)