Podcast
Questions and Answers
Which type of packet is NOT used with Extensible Authentication Protocol (EAP)?
Which type of packet is NOT used with Extensible Authentication Protocol (EAP)?
- Failure
- Response
- Request
- Acknowledgement (correct)
What is the purpose of a rogue AP in a wireless network?
What is the purpose of a rogue AP in a wireless network?
- Improving network performance
- Allowing attackers to bypass network security (correct)
- Enhancing network security
- Providing secure access to authorized users
Which technology is primarily aimed at smartphones and smartcards for communication with devices in proximity?
Which technology is primarily aimed at smartphones and smartcards for communication with devices in proximity?
- Wi-Fi
- RFID
- NFC (correct)
- Bluetooth
What are two wireless security standards widely used today?
What are two wireless security standards widely used today?
How is controlling access to a WLAN commonly achieved through the access point (AP)?
How is controlling access to a WLAN commonly achieved through the access point (AP)?
What feature of WLANs makes them often targeted by attackers?
What feature of WLANs makes them often targeted by attackers?
What security mistakes might naïve wireless users make that can expose them to attacks?
What security mistakes might naïve wireless users make that can expose them to attacks?
What is the purpose of IEEE standards in wireless local area networks (WLANs)?
What is the purpose of IEEE standards in wireless local area networks (WLANs)?
What is a key flaw associated with WEP and WPS in wireless security?
What is a key flaw associated with WEP and WPS in wireless security?
Why is detecting rogue access points important for wireless network security?
Why is detecting rogue access points important for wireless network security?
Flashcards
Bluejacking
Bluejacking
A type of wireless attack that targets Bluetooth-enabled devices to send unwanted messages.
Bluesnarfing
Bluesnarfing
A type of wireless attack that allows attackers to gain unauthorized access to data on Bluetooth-enabled devices.
Near Field Communication (NFC)
Near Field Communication (NFC)
A set of communication standards used between devices that are close to each other.
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
Signup and view all the flashcards
Wireless Local Area Network (WLAN)
Wireless Local Area Network (WLAN)
Signup and view all the flashcards
Evil Twin Attack
Evil Twin Attack
Signup and view all the flashcards
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP)
Signup and view all the flashcards
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA)
Signup and view all the flashcards
WPA2 and WPA3
WPA2 and WPA3
Signup and view all the flashcards
MAC Address Filtering
MAC Address Filtering
Signup and view all the flashcards
Study Notes
Wireless Network Security Fundamentals
Wireless Attacks
- Wireless data systems are vulnerable to various attacks, including:
- Bluetooth attacks
- Near Field Communication (NFC) attacks
- Radio Frequency Identification (RFID) attacks
- Wireless Local Area Network (WLAN) attacks
Bluetooth Attacks
- Bluetooth is a wireless technology using short-range radio frequency (RF) transmissions
- Bluetooth attacks include:
- Bluejacking: sending unsolicited messages to Bluetooth-enabled devices
- Bluesnarfing: accessing unauthorized information from a wireless device through a Bluetooth connection
Near Field Communication (NFC) Attacks
- NFC is a set of standards used to establish communication between devices in close proximity
- NFC devices can be active or passive
- Examples of NFC uses include:
- Contactless payment systems
- Automobile entertainment
- Office and retail stores
- Transportation
Radio Frequency Identification (RFID) Attacks
- RFID is commonly used to transmit information between employee identification badges, inventory tags, and other paper-based tags
- RFID tags are susceptible to different attacks
- Most RFID tags are passive and do not have their own power supply
Wireless Local Area Network (WLAN) Attacks
- A WLAN is designed to replace or supplement a wired LAN
- WLAN versions include:
- IEEE 802.11
- IEEE 802.11a
- IEEE 802.11b
- IEEE 802.11g
- IEEE 802.11n
- IEEE 802.11ac
- IEEE 802.11ax
- WLAN hardware includes:
- Wireless client network interface card adapters
- Access points (APs)
- WLAN attacks include:
- Rogue access points
- Evil twins
- Intercepting wireless data
- Wireless Denial of Service (DoS) attacks
- Spoofing
- Manipulating duration field values
Vulnerabilities of WLAN Security
- Wired Equivalent Privacy (WEP) has vulnerabilities, including:
- Short initialization vector (IV)
- Repeatable IVs
- Wi-Fi Protected Setup (WPS) has design and implementation flaws
- MAC address filtering has vulnerabilities, including:
- MAC addresses are initially exchanged in an unencrypted format
- Managing a large number of addresses is challenging
Wireless Security Solutions
- Wi-Fi Protected Access (WPA) and WPA2 are more secure than WEP
- WPA2 addresses encryption and authentication
- Wi-Fi Protected Access 3 (WPA3) is the next generation of WPA, with improvements including:
- Simultaneous Authentication of Equals (SAE)
- Individual data encryption
- Improved interaction with Internet of Things (IoT) devices
- Other security steps include:
- Installation and configuration
- Specialized systems communications
- Rogue AP system detection
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on wireless network security fundamentals with this quiz based on Module 11 of CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition by Mark Ciampa. Questions cover wireless network attacks, vulnerabilities of WLAN security, and more.