CompTIA Security+ Wireless Network Security Fundamentals: Module 11 Quiz

TroubleFreeGradient avatar
TroubleFreeGradient
·
·
Download

Start Quiz

Study Flashcards

10 Questions

Which type of packet is NOT used with Extensible Authentication Protocol (EAP)?

Acknowledgement

What is the purpose of a rogue AP in a wireless network?

Allowing attackers to bypass network security

Which technology is primarily aimed at smartphones and smartcards for communication with devices in proximity?

NFC

What are two wireless security standards widely used today?

WPA and WPA2

How is controlling access to a WLAN commonly achieved through the access point (AP)?

Via MAC filtering

What feature of WLANs makes them often targeted by attackers?

Wireless transmission

What security mistakes might naïve wireless users make that can expose them to attacks?

Connecting to rogue access points

What is the purpose of IEEE standards in wireless local area networks (WLANs)?

Establishing WLAN security protections

What is a key flaw associated with WEP and WPS in wireless security?

Significant design and implementation flaws

Why is detecting rogue access points important for wireless network security?

To prevent unauthorized access and potential attacks

Study Notes

Wireless Network Security Fundamentals

Wireless Attacks

  • Wireless data systems are vulnerable to various attacks, including:
    • Bluetooth attacks
    • Near Field Communication (NFC) attacks
    • Radio Frequency Identification (RFID) attacks
    • Wireless Local Area Network (WLAN) attacks

Bluetooth Attacks

  • Bluetooth is a wireless technology using short-range radio frequency (RF) transmissions
  • Bluetooth attacks include:
    • Bluejacking: sending unsolicited messages to Bluetooth-enabled devices
    • Bluesnarfing: accessing unauthorized information from a wireless device through a Bluetooth connection

Near Field Communication (NFC) Attacks

  • NFC is a set of standards used to establish communication between devices in close proximity
  • NFC devices can be active or passive
  • Examples of NFC uses include:
    • Contactless payment systems
    • Automobile entertainment
    • Office and retail stores
    • Transportation

Radio Frequency Identification (RFID) Attacks

  • RFID is commonly used to transmit information between employee identification badges, inventory tags, and other paper-based tags
  • RFID tags are susceptible to different attacks
  • Most RFID tags are passive and do not have their own power supply

Wireless Local Area Network (WLAN) Attacks

  • A WLAN is designed to replace or supplement a wired LAN
  • WLAN versions include:
    • IEEE 802.11
    • IEEE 802.11a
    • IEEE 802.11b
    • IEEE 802.11g
    • IEEE 802.11n
    • IEEE 802.11ac
    • IEEE 802.11ax
  • WLAN hardware includes:
    • Wireless client network interface card adapters
    • Access points (APs)
  • WLAN attacks include:
    • Rogue access points
    • Evil twins
    • Intercepting wireless data
    • Wireless Denial of Service (DoS) attacks
    • Spoofing
    • Manipulating duration field values

Vulnerabilities of WLAN Security

  • Wired Equivalent Privacy (WEP) has vulnerabilities, including:
    • Short initialization vector (IV)
    • Repeatable IVs
  • Wi-Fi Protected Setup (WPS) has design and implementation flaws
  • MAC address filtering has vulnerabilities, including:
    • MAC addresses are initially exchanged in an unencrypted format
    • Managing a large number of addresses is challenging

Wireless Security Solutions

  • Wi-Fi Protected Access (WPA) and WPA2 are more secure than WEP
  • WPA2 addresses encryption and authentication
  • Wi-Fi Protected Access 3 (WPA3) is the next generation of WPA, with improvements including:
    • Simultaneous Authentication of Equals (SAE)
    • Individual data encryption
    • Improved interaction with Internet of Things (IoT) devices
  • Other security steps include:
    • Installation and configuration
    • Specialized systems communications
    • Rogue AP system detection

Test your knowledge on wireless network security fundamentals with this quiz based on Module 11 of CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition by Mark Ciampa. Questions cover wireless network attacks, vulnerabilities of WLAN security, and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser