NIS Chapter 02 Flashcards

1
Q

in which layer of the OSI model does 802.11 authentication? And what purpose does this authentication serve?

A
  • In the 2nd layer
  • it serves the purpose of establishing an initial connection between the AP and the client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 methods for authentication in the 802.11 2007

A

Open system authentication and shared key authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Open System Authentication? What is the alias for it?

A

this is a type of authentication method used in 802.11 used to create a connection between a client and an AP. The AP creates this connection without any prior client validation.

  • null authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In detail, describe the 2 message authentication transaction sequence

for which authentication method?

A
  1. message one asserts identity and requests authentication
  2. the 2nd returns the authentication result
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a vulnerability of OSA?

A

There are many ways that SSIDs can be discovered and this method is based on the matching of SSIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To use OSA safely, the SSID can be cloaked in order to prevent potential attackers finding the SSID. Is this a good approach?

A

Apparently not, it is not always possible to turn off SSID beaconing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 2 other OSA vulnerabilities

A
  • does not allow for freely roaming because authentication is needed when moving between APs
  • It is not that difficult to find the SSID even with beaconing turned off because AP sends other management frames.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another way that a non broadcasted SSID can be detected?

A

BY sending a disassociation frame, forcing a association again and then listening in on the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what security protocol is used by shared key authentication? And how do they work together?

A

WEP

It is used to authenticate clients stations. A static WEP key needs to be known on the client and the AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provide in detail the steps taken in authenticating a client device in Shared key authentication (5)

A
  1. the client will send an authentication frame requesting to be authenticated
  2. The AP will send a challenge text
  3. The client will have to encrypt the text sent using the supposed shared key and send it back to AP
  4. AP will encrypt and compare and then either authenticate or not \
  5. send auth frame if matches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the security risk associated with the SKA?

A

the clear text that is used to authenticate can be captured and then used to derive the static WEP key. And since the key is static, all the frames can be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the WEP encryption?

A

a WIFI security standard intended to bring confidentiality through encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is the WEP considered flawed?

A
  • the encryption algo in itself is weak (how?)
    and there is not key management, a single key is used for all frames which is extremely risky
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 3 reasons why the WEP is considered a weak algorithm

A
  1. Key sizes are considered small and are therefore susceptible to brute-force attacks
  2. RC4 stream cipher used by WEP is considered weak in itself
  3. Reuse of initialisation vectors make recognisable patterns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the protocol that was introduced to replace WEP?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are VPNs no longer recommended for security in enterprises?

A
  1. extra overhead from VPN encryption
  2. complex configuration
  3. Better layer 2 security schemes
17
Q

define the differences between the 2 major types of VPN topologies

A

router-router: VPN is established between 2 seperate networks

client-server: secure communication between a client device and a central server.

18
Q

What are the 3 major protocols used in layer 3 VPN tech

A
  1. point to point
  2. Internet Protocol Security (IPsec)
    3, Layer 2 Tunnelling protocol (L2TP)
19
Q

MAC is the physical address for what part?

A

network card

20
Q

What is the downside of MAC filtering

3

A
  • high admin burden
  • guest access
  • MAC address spoofing
21
Q

What is SSID segmentation?

A

When virtual local area networks are created within a WLAN, which have separate SSIDs and can have different security settings. Illusion of different physical structure

22
Q

What is the common SSID segmentation strategy? (3)

A

Guest: little to no security. no access to network resources

Voice: WPA2-Personal security, traffic routed to VoIP server

Data: WPA2-Enterprise, full access to resources once authenticated

23
Q

What are the downsides of using SSID segmentation?

A
  • lots of configuration required
  • because each SSID is often treated as a separate SSID, additional management frames are transmitted
  • MAC layer overhead affects throughput and performance of the WLAN
24
Q

What is SSID cloaking?

A

disabling the broadcast SSID to hide the wireless network name