Chapter 7 Securing Wireless LANs Flashcards
What is the wireless encryption standard that was part of the original 802.11 standard and used the RC4 encryption algorithm?
Wireless Equivalent Privacy (WEP)
What were the security vulnerabilities associated with WEP?
WEP had significant security vulnerabilities, making it easy to crack.
What encryption standard replaced WEP and introduced stronger security measures?
Wi-Fi Protected Access (WPA)
What encryption algorithm did WPA use, and what were its improvements over WEP?
WPA used RC4 encryption but implemented stronger security measures, such as pre-shared keys, making it more secure than WEP.
What is the most popular wireless encryption standard for over a decade?
WPA2
What encryption algorithm did WPA2 introduce, and how did it improve security over WPA?
WPA2 introduced the Advanced Encryption Standard (AES) instead of RC4, offering stronger security and backward compatibility with older devices.
What is the latest wireless encryption standard that provides enhanced security features?
WPA3
What are some features of WPA3 that enhance security?
WPA3 disallows outdated protocols, implements protected management frames, and introduces Simultaneous Authentication of Equals (SAE) for secure connections between devices.
What does RFID stand for, and what is its typical range?
RFID stands for Radio Frequency Identification, and its range is approximately 5 meters (16 feet).
How are RFID tags powered, and what are some common applications?
RFID tags are activated by proximity to a scanning device that emits power. Common applications include inventory control, pet locators, and embedded passports.
What is NFC, and how does it differ from RFID?
NFC stands for Near Field Communication and is a subset of RFID. NFC has a much closer range of about 5 centimeters (1.5 inches) and is commonly used for contactless payments and data sharing.
What are some uses of NFC tags, and how can they be programmed?
NFC tags can be programmed to contain various data, such as Wi-Fi network information. They can be used for personal applications like sharing network credentials with guests or for other data-sharing purposes.
What is the range of Bluetooth devices, and how do they need to be paired?
Bluetooth devices have varying ranges depending on their class, with Class 1 having a range of up to 100 meters (328 feet) and Class 2 having a range of about 10 meters (30 feet). Bluetooth devices need to be paired to establish trust and enable data transfer between them.
What are some common uses of Bluetooth, and what are potential attacks associated with it?
Bluetooth is used for applications like wireless headphones, smartphone connections to car stereos, and file sharing between devices. Potential attacks include Bluejacking and Bluesnarfing, which involve unsolicited messages and capturing Bluetooth network traffic, respectively.
What is Wi-Fi coverage, and how is it measured?
Wi-Fi coverage refers to the range of Wi-Fi signals from the transmission source. It is measured in decibel milliwatts (dBm), where higher values indicate stronger signal strength and better performance.
How can atmospheric conditions affect wireless transmissions?
Atmospheric conditions like snow, rain, or sandstorms can potentially affect Wi-Fi signals and cause disruptions in wireless communications.
What is a cantenna, and what is its purpose?
A cantenna is a homemade high-gain antenna that can extend the range of Wi-Fi signals. It is typically made using items like a Pringles can or an empty juice can and can improve connectivity to a wireless network.
What are the potential issues with channel overlapping in Wi-Fi networks?
Channel overlapping occurs when two wireless networks in close proximity use the same channel. This can cause interference and lead to unreliable Wi-Fi connections. It is important to configure Wi-Fi networks on unique channels to avoid overlap.
How can Wi-Fi site surveys help optimize Wi-Fi performance?
Wi-Fi site surveys involve mapping out the coverage area, identifying access points, and analyzing signal strength and potential issues like channel overlapping. This helps in optimizing performance, identifying dead zones, and extending coverage where needed.
What are some tools that can be used for Wi-Fi site surveys?
Tools like NetSpot can be used for Wi-Fi site surveys. These tools scan the environment, discover visible access points, and provide information on signal strength and coverage areas, allowing for analysis and optimization of Wi-Fi networks.
What is the purpose of a heat map in a Wi-Fi site survey tool?
A heat map visually represents signal strength in different areas of a Wi-Fi network. Red, orange, and yellow indicate stronger signal strength, while light blue and darker blue represent weaker signal areas. Heat maps help identify areas with poor signal strength and guide the placement of additional access points for better coverage.
How can malicious users exploit Wi-Fi site surveys?
Malicious users can conduct Wi-Fi site surveys to gather information about nearby wireless networks that may not be adequately secured. This information can be used for unauthorized access or to exploit vulnerabilities in the network’s security measures.
What is war chalking?
War chalking is a technique where open wireless networks are discovered, and their locations are marked on the sidewalk using chalk. It was a way to map out the availability of open networks in urban areas.
What is war driving, and how is it related to Wi-Fi discovery?
War driving involves driving around with a scanning device, such as a laptop or smartphone, to detect and map out wireless networks. It helps in identifying the location and configuration of Wi-Fi networks within range. War flying is a similar technique using drones equipped with Wi-Fi capabilities.