Flashcards in Chapter 5 - Protecting Wireless Networks Deck (26)
Tell me the details on the 5 types of wireless protocols.
What are their letters? Bandwidth? Frequency?
a - 54Mbps, 5 GHz
b - 11 Mbps, 2.4 GHz, also called Wi-Fi
g - 54 Mbps, 2.4 GHz
i - WPA2
n - 600Mbps, 5 GHz and 2.4 GHz
Why was WEP weak?
because of the encryption algorithms it used, RC4
What was developed to strengthen WEP?
Temporal Key Integrity Protocol
Tell me the difference between WPA and WPA2.
WPA uses RC4 and TKIP.
WPA2 uses CCMP (uses AES) and uses the entire 802.11i standard.
What is WTLS? What does it provide?
Wireless Transport Layer Security, is the security layer of the Wireless Application Protocol. It provides authentication, encryption, and data integrity.
Inside, it has a handshake protocol, alert protocol, application protocol, change cipher spec protocol, and record protocol.
Tell me about the three levels of security in WAP.
Anonymous - virtually anyone can connect
Server - workstation must authenticate against the server.
Two-Way (client and server) - requires both ends of the connection to authenticate to confirm validity
You have a mobile environment using WAP security. Tell me about the 4 technologies used to provide services between the client pc and the WAP server.
Wireless Session Protocol - session info
Wireless Transaction Protocol - similar to TCP and UDP
Wireless Transport Layer Security - security layer of WAP
Wireless Datagram Protocol - common interface
This antenna has a 360 degree pattern and you'll want to put it in the middle of the area to be covered.
This antenna focuses the signal into one direction.
How much of an increase in dB does it take to double your output power?
Tru/False: Access Points have MAC filtering turned on by default.
MAC filtering is synonymous with what?
Explain to me how a captive portal works.
requires users to agree to some condition before they use the network or internet
What is EAP? What are the 5 types?
Extensible Authentication Protocol
TLS, PSK, MD5, LEAP and PEAP
TTLS adds a layer of security against what kinds of attacks?
man in the middle attacks
Tell me two times when you would use NFC.
near field communication is used in RFID and Wi-Fi
You have a WPS, Wi-Fi Protected Setup. What kind of attack is it susceptible to?
Why was LEAP created?
a quick fix for problems with WEP
How does LEAP work? What is it susceptible to?
requires mutual authentication
Why is PEAP the better option over EAP-TTLS?
because it establishes an encrypted channel between the server and the client.
what is cloaking?
turning off the SSID broadcast
You are intentionally interfering with a signal. what is this called?
You've discovered a weak access point and are leaving signals that point it out. what is this called?
A rogue access point will be involved in what kind of attack?
What's the difference between bluejacking and bluesnarfing?
bluejacking-sending unsolicited message over a bluetooth connection
bluesnarfing-gaining unauthorized access through a bluetooth connection.