Securing Wireless Networks Flashcards

1
Q

You have set up a wireless network for your small office of 50 users. Which of the following encryption protocols would you implement to ensure the highest level of encryption security?

WPA

WEP 128 bit

WPA2

A

WPA2

WPA2 is currently the strongest level of encryption security available for a wireless network. WPA2 replaces the weaker WPA and adds RSN support that includes added protection for ad hoc networks, key caching, pre-roaming authentication, and CCMP, which utilizes the AES cipher to replace TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are connecting to a secure, encrypted wireless network. During the initial connection phase, you are asked to enter a passphrase. Which WPA encryption method is in use on the network?

WPA-EAP

WPA-TKIP

WPA-PSK

A

WPA-PSK

WPA-PSK uses a pre-shared key passphrase that requires all devices on the wireless network to use the same passphrase to access the network. WPA-Enterprise uses an authentication server to perform key management and exchange for all wireless clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are setting up a new wireless security network for your small office. You have set the SSID of the network to a secure value. Which other action can you take to enhance SSID security?

Enable SSID broadcast.

Disable SSID snarfing.

Disable SSID broadcast.

A

Disable SSID broadcast.

By disabling SSID broadcast, you ensure your access points will not advertise the SSID they are using for wireless clients to connect. A user would require prior knowledge of the SSID before he could access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following types of wireless attacks utilizes a weakness in WEP key generation and encryption to decrypt WEP encrypted data?

IV attack

War driving

PSK attack

A

IV attack

The IV (initialization vector) attack uses the weakness in the 24-bit generated IV that is paired with the WEP encryption key. The IV can be discovered over time on busy networks that use repeated IV values, which can then be used to decrypt the cipher stream without the hacker knowing the WEP key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To further secure your wireless network, you implement MAC address filtering. Which of the following statements describes the wireless network behavior after you do this?

It allows wireless access only for specified MAC addresses.

It prevents wireless access only from specified MAC addresses.

It encrypts only specified wireless device MAC addresses.

A

It allows wireless access only for specified MAC addresses.

A list of authorized client MAC addresses must be configured on each access point for the network. If any client tries to communicate with the access point and its MAC address isn’t in the list, it will be denied access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After checking the signal strength of a specific floor of your building, you realize that two of the farthest offices on the floor have very poor signal strength. Which of the following actions can you perform to provide a cost-effective solution to increase signal strength to that part of the building?

Disable encryption to speed up the network.

Add another access point.

Use a cable to extend the antenna range of the closest access point.

A

Add another access point.

You can use a cable and an external antenna to extend the range of your closest access point to the office with the low signal. This is an easy and inexpensive solution rather than purchasing and installing a new access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are installing a wireless network in a manufacturing facility. Which of the following aspects of the wireless network do you concentrate on to prevent security issues with EMI?

Use of 802.11g or 802.11n

SSID network name

Access point and antenna placement

A

Access point and antenna placement

You need to make sure that the antenna and access point are not placed close to any other electrical wires or devices (especially those that broadcast on a similar frequency), where electrical interference can cause a loss of wireless signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly