Flashcards in Chapter 5 - Protecting Wireless Networks Deck (25):
Which standard defines wireless LANs transmitting at 1Mbps or 2Mbps bandwidths using 2.4 GHz frequency Spectrum
Which standard provides for security enhancements to the wireless standard with particular focus on authentication. The standard is often referenced as WPA2.
What wireless protocol was implemented in a number of wireless devices, including smartphones and other mobile devices?
Wired Equivalent Privacy (WEP)
Which Protocol uses a smaller version of HTML called WML, which is used for Internet displays?
Wireless Application Protocol (WAP)
What provides an encrypted and authenticated connection between a wireless client and a server?
Wireless Transport Layer Security (WTLS)
What is Anonymous Authentication?
This allows virtually anyone to connect to the wireless portal
What is Server Authentication?
This requires the workstation to authenticate against the server.
What is 2-way Authentication?
This requires both ends of the connection (client and server) to authenticate to confirm validity
Which Protocol provide services similar to TCP and UDP for WAP?
Wireless Transaction Protocol (WTP)
What are the technologies used to provide services between devices?
* Wireless Session Protocol (WSP) - manages the session information and connection between devices.
* Wireless Transaction Protocol (WTP) - provides services similar to TCP & UDP for WAP.
* Wireless Transport Layer Security (WTLS) is the security layer of WAP
* Wireless Datagram Protocol (WDP) - provides the common interface between devices
What are captive Portals?
Require users to agree to some condition before they use the network or Internet.
What does NIST recommend that VPN use for validated encryption algorithms?
Federal Information Processing Standards (FIPS)
What are the five EAP types adopted by the WPA/WPA2 standard?
What technology that requires a user to bring the client close to the AP in order to verify that the device is present?
Near Field Communications (NFC)
What is LEAP?
Lightweight Extensible Authentication Protocol (LEAP) was created by Cisco as an extension to EAP, but it's being phased out in favor of PEAP.
It lacks native Windows support
What is PEAP?
Protected Extensible Authentication Protocol (PEAP)
Cisco, RSA and Microsoft worked together to create PEAP,
What is War Driving?
Refers to driving around town with a laptop looking for APs to communicate with.
What is War Chalking?
Involves those who discover a way into the network leaving signals on, or outside.
What is an Evil Twin Attack?
Is where a rogue Wireless Access Point poses as a legitimate wireless service provider to information that users transmit.
What is Bluesnarfing?
Gaining unauthorized access through a Bluetooth connection
What is Bluejacking?
Sending if unsolicited messages (think spam) over a Bluejacking connection.
What are some of the "Sandwich Shop Attack"?
* Rogue Access Point
* Evil Twin
* Replay Attack
What is CCMP?
Counter mode with Cipher block chaining Message Authentication Code Protocol (CCMP)
Uses a 128-bit AES encryption with 48-bit initialization vector.
Where do you go to change the Order of Preferred Networks?
Start > Control Panel > Network and Sharing > Manage Wireless Networks