Chapter 5 - Protecting Wireless Networks Flashcards Preview

CompTIA Security+ > Chapter 5 - Protecting Wireless Networks > Flashcards

Flashcards in Chapter 5 - Protecting Wireless Networks Deck (25):
1

Rene
Which standard defines wireless LANs transmitting at 1Mbps or 2Mbps bandwidths using 2.4 GHz frequency Spectrum

page 169
802.11

2

Rene
Which standard provides for security enhancements to the wireless standard with particular focus on authentication. The standard is often referenced as WPA2.

page 170
802.11i

3

Rene
What wireless protocol was implemented in a number of wireless devices, including smartphones and other mobile devices?

page 171
Wired Equivalent Privacy (WEP)

4

Rene
Which Protocol uses a smaller version of HTML called WML, which is used for Internet displays?

page 172
Wireless Application Protocol (WAP)

5

Rene
What provides an encrypted and authenticated connection between a wireless client and a server?

page 173
Wireless Transport Layer Security (WTLS)

6

Rene
What is Anonymous Authentication?

page 174
This allows virtually anyone to connect to the wireless portal

7

Rene
What is Server Authentication?

page 174
This requires the workstation to authenticate against the server.

8

Rene
What is 2-way Authentication?

page 174
This requires both ends of the connection (client and server) to authenticate to confirm validity

9

Rene
Which Protocol provide services similar to TCP and UDP for WAP?

page 175
Wireless Transaction Protocol (WTP)

10

Rene
What are the technologies used to provide services between devices?

page 175
* Wireless Session Protocol (WSP) - manages the session information and connection between devices.
* Wireless Transaction Protocol (WTP) - provides services similar to TCP & UDP for WAP.
* Wireless Transport Layer Security (WTLS) is the security layer of WAP
* Wireless Datagram Protocol (WDP) - provides the common interface between devices

11

Rene
What are captive Portals?

page 180
Require users to agree to some condition before they use the network or Internet.

12

Rene
What does NIST recommend that VPN use for validated encryption algorithms?

page 181
Federal Information Processing Standards (FIPS)

13

Rene
What are the five EAP types adopted by the WPA/WPA2 standard?

page 181
* EAP-TLS
* EAP-PSK
* EAP-MD5
* LEAP
* PEAP

14

Rene
What technology that requires a user to bring the client close to the AP in order to verify that the device is present?

page 182
Near Field Communications (NFC)

15

Rene
What is LEAP?

page 182
Lightweight Extensible Authentication Protocol (LEAP) was created by Cisco as an extension to EAP, but it's being phased out in favor of PEAP.
It lacks native Windows support

16

Rene
What is PEAP?

page 182
Protected Extensible Authentication Protocol (PEAP)
Cisco, RSA and Microsoft worked together to create PEAP,

17

Rene
What is War Driving?

page 185
Refers to driving around town with a laptop looking for APs to communicate with.

18

Rene
What is War Chalking?

page 185
Involves those who discover a way into the network leaving signals on, or outside.

19

Rene
What is an Evil Twin Attack?

page186
Is where a rogue Wireless Access Point poses as a legitimate wireless service provider to information that users transmit.

20

Rene
What is Bluesnarfing?

page 187
Gaining unauthorized access through a Bluetooth connection

21

Rene
What is Bluejacking?

page 187
Sending if unsolicited messages (think spam) over a Bluejacking connection.

22

Rene
What are some of the "Sandwich Shop Attack"?

page 188
* Rogue Access Point
* Jamming
* Interference
* Bluejacking
* Evil Twin
* Replay Attack

23

Rene
What is CCMP?

page 172
Counter mode with Cipher block chaining Message Authentication Code Protocol (CCMP)
Uses a 128-bit AES encryption with 48-bit initialization vector.

24

Rene
Where do you go to change the Order of Preferred Networks?

page 179
Start > Control Panel > Network and Sharing > Manage Wireless Networks

25

Rene
What is cloaking?

page 183
turning off the SSID broadcast