Deck 10: Implementing Wireless LAN Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 10: Implementing Wireless LAN Security
1
Amongst the most common transport encryption algorithms,used to securely transmit documents over the Internet is which of the following?
A) HTTP
B) SSL
C) SSH
D) SNMP
A) HTTP
B) SSL
C) SSH
D) SNMP
B
2
What authentication system did the proposed WEP2 standard use?
A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
A
3
Which type of WIDS/WIPS sensor uses dedicated sensors for scanning the RF for attacks?
A) integrated
B) overlay
C) AP
D) embedded
A) integrated
B) overlay
C) AP
D) embedded
B
4
Dictionary attacks are used to attack what aspect of WEP2?
A) encryption
B) initialization vector problems
C) pseudo-random number generator issues
D) authentication
A) encryption
B) initialization vector problems
C) pseudo-random number generator issues
D) authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
A ____ VPN is a user-to-LAN connection used by remote users.
A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT a typical AP status tagged by a WIDS/WIPS system?
A) Unknown
B) Authorized
C) Monitored
D) Rogue
A) Unknown
B) Authorized
C) Monitored
D) Rogue
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
WPA2 uses a block cipher rather than a stream cipher.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
A virtual private network (VPN)uses a public,unsecured network as if it were a private,secured network.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Which was developed to help users who have little or no knowledge of security quickly and easily implement WPA2 on their WLANs?
A) VPN
B) TLS
C) IEEE 802.1x
D) WPS
A) VPN
B) TLS
C) IEEE 802.1x
D) WPS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
What does WPA include that is designed to prevent an attacker from conducting man-in-the-middle attacks?
A) cyclic redundancy check
B) preshared key
C) message integrity check
D) a temporal key
A) cyclic redundancy check
B) preshared key
C) message integrity check
D) a temporal key
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Which encryption protocol is used for 802.11i/WPA2?
A) RSN
B) CCMP
C) PSK
D) TKIP
A) RSN
B) CCMP
C) PSK
D) TKIP
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true about RADIUS?
A) messages are never sent from the wireless device to the RADIUS server
B) RADIUS clients,such as laptops,request authentication from a server
C) it is used by WPA personal as the preferred authentication method
D) it is primarily used in low-volume SOHO applications
A) messages are never sent from the wireless device to the RADIUS server
B) RADIUS clients,such as laptops,request authentication from a server
C) it is used by WPA personal as the preferred authentication method
D) it is primarily used in low-volume SOHO applications
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Signature-based monitoring can be described as which of the following?
A) attempts to answer the question: "will this do something harmful if allowed to execute?"
B) compiles a baseline of normal activities and looks for statistical anomalies
C) examines network traffic,activity,and transactions,and looks for well-known patterns
D) continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
A) attempts to answer the question: "will this do something harmful if allowed to execute?"
B) compiles a baseline of normal activities and looks for statistical anomalies
C) examines network traffic,activity,and transactions,and looks for well-known patterns
D) continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Due to the enhancements in WEP2,it was widely implemented and remains a popular security mechanism today.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
What does WPA use for authentication?
A) Kerberos
B) open system authentication
C) preshared key
D) certificates
A) Kerberos
B) open system authentication
C) preshared key
D) certificates
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which problem did dynamic WEP resolve?
A) man-in-the-middle attacks
B) weak IV problem
C) denial of service attacks
D) dictionary attacks
A) man-in-the-middle attacks
B) weak IV problem
C) denial of service attacks
D) dictionary attacks
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Kerberos became the heart of the WPA security method.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
What was a design goal of WPA?
A) fit into the existing WEP engine
B) a long-term solution to WEP vulnerabilities
C) require users to replace wireless hardware to achieve better security
D) All of the above
A) fit into the existing WEP engine
B) a long-term solution to WEP vulnerabilities
C) require users to replace wireless hardware to achieve better security
D) All of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
It is important that the entire RF spectrum be scanned for potential attacks,which means the channels on which frequencies should be scanned?
A) 11 GHz,54 GHz
B) 2.4 MHz,3.5 MHz
C) 2.4 GHz,5 GHz
D) 11 MHz,54 MHz
A) 11 GHz,54 GHz
B) 2.4 MHz,3.5 MHz
C) 2.4 GHz,5 GHz
D) 11 MHz,54 MHz
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Describe a dictionary attack.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following are TKIP enhancement areas? (Choose all that apply.)
A)a 40-bit encryption key is manually entered on APs and devices.
B)the required key length is increased to 128 bits
C)the IV is enhanced to effectively eliminate collisions
D)different keys are used for different types of traffic
A)a 40-bit encryption key is manually entered on APs and devices.
B)the required key length is increased to 128 bits
C)the IV is enhanced to effectively eliminate collisions
D)different keys are used for different types of traffic
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
A WIDS/WIPS that uses a(n)_________________ sensor uses existing APs to monitor the RF.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What were three weaknesses in WEP identified by university studies?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following are true about wireless security systems? (Choose all that apply.)
A)a method used by WIDS is anomaly-based monitoring
B)WIPS can prevent an attack while WIDS cannot
C)WIPS is dependent on signatures
D)passive WIDS can configure the firewall if an attack is detected
A)a method used by WIDS is anomaly-based monitoring
B)WIPS can prevent an attack while WIDS cannot
C)WIPS is dependent on signatures
D)passive WIDS can configure the firewall if an attack is detected
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Name and describe the two types of wireless intrusion systems.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Briefly describe RADIUS and mention a strength of RADIUS.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Describe the three areas of enhancement provided by TKIP.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
What is EAP?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
What are the three major components in TKIP that address security vulnerabilities? (Choose three.)
A)IV sequence
B)MIC
C)block cipher
D)TKIP key mixing
A)IV sequence
B)MIC
C)block cipher
D)TKIP key mixing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Temporal Key Integrity Protocol (TKIP)has three major components to address vulnerabilities.List and describe them.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Describe a block cipher.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
WPA ____________________ was designed for individuals or small office home office (SOHO)settings of generally 10 or fewer employees.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
________________ WEP solves the weak IV problem by rotating the keys frequently and uses different keys for different types of traffic.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply)
A)The RC4 PRNG is not properly implemented.
B)WEP didn't always encrypt the data.
C)Initialization vector keys are reused.
D)WEP does not prevent man-in-the-middle attacks.
A)The RC4 PRNG is not properly implemented.
B)WEP didn't always encrypt the data.
C)Initialization vector keys are reused.
D)WEP does not prevent man-in-the-middle attacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
What are the four types of of packets used by EAP?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Used in WEP2,____________________ was developed by the Massachusetts Institute of Technology (MIT)and used to verify the identity of network users.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Describe pre-shared key authentication.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Authentication for WPA Personal is accomplished using a ____________ key.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck