CompTIA Security+ Wireless Network Security Fundamentals: Module 11 Quiz
10 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of packet is NOT used with Extensible Authentication Protocol (EAP)?

  • Failure
  • Response
  • Request
  • Acknowledgement (correct)

What is the purpose of a rogue AP in a wireless network?

  • Improving network performance
  • Allowing attackers to bypass network security (correct)
  • Enhancing network security
  • Providing secure access to authorized users

Which technology is primarily aimed at smartphones and smartcards for communication with devices in proximity?

  • Wi-Fi
  • RFID
  • NFC (correct)
  • Bluetooth

What are two wireless security standards widely used today?

<p>WPA and WPA2 (D)</p> Signup and view all the answers

How is controlling access to a WLAN commonly achieved through the access point (AP)?

<p>Via MAC filtering (D)</p> Signup and view all the answers

What feature of WLANs makes them often targeted by attackers?

<p>Wireless transmission (D)</p> Signup and view all the answers

What security mistakes might naïve wireless users make that can expose them to attacks?

<p>Connecting to rogue access points (D)</p> Signup and view all the answers

What is the purpose of IEEE standards in wireless local area networks (WLANs)?

<p>Establishing WLAN security protections (A)</p> Signup and view all the answers

What is a key flaw associated with WEP and WPS in wireless security?

<p>Significant design and implementation flaws (A)</p> Signup and view all the answers

Why is detecting rogue access points important for wireless network security?

<p>To prevent unauthorized access and potential attacks (A)</p> Signup and view all the answers

Flashcards

Bluejacking

A type of wireless attack that targets Bluetooth-enabled devices to send unwanted messages.

Bluesnarfing

A type of wireless attack that allows attackers to gain unauthorized access to data on Bluetooth-enabled devices.

Near Field Communication (NFC)

A set of communication standards used between devices that are close to each other.

Radio Frequency Identification (RFID)

A technology used to transmit information between devices, often used for employee badges or inventory tracking.

Signup and view all the flashcards

Wireless Local Area Network (WLAN)

A wireless network designed to replace or supplement wired networks, offering flexibility for devices.

Signup and view all the flashcards

Evil Twin Attack

A type of WLAN attack where an attacker sets up a fake access point mimicking a legitimate one to trick users into connecting.

Signup and view all the flashcards

Wired Equivalent Privacy (WEP)

A security protocol that encrypts data transmitted over a WLAN.

Signup and view all the flashcards

Wi-Fi Protected Access (WPA)

A security protocol designed to improve upon WEP, providing stronger encryption and authentication.

Signup and view all the flashcards

WPA2 and WPA3

More advanced security solutions like WPA2 and WPA3 offer more robust encryption and authentication for WLANs.

Signup and view all the flashcards

MAC Address Filtering

A technique used to filter access to a WLAN based on the unique identification number of a device.

Signup and view all the flashcards

Study Notes

Wireless Network Security Fundamentals

Wireless Attacks

  • Wireless data systems are vulnerable to various attacks, including:
    • Bluetooth attacks
    • Near Field Communication (NFC) attacks
    • Radio Frequency Identification (RFID) attacks
    • Wireless Local Area Network (WLAN) attacks

Bluetooth Attacks

  • Bluetooth is a wireless technology using short-range radio frequency (RF) transmissions
  • Bluetooth attacks include:
    • Bluejacking: sending unsolicited messages to Bluetooth-enabled devices
    • Bluesnarfing: accessing unauthorized information from a wireless device through a Bluetooth connection

Near Field Communication (NFC) Attacks

  • NFC is a set of standards used to establish communication between devices in close proximity
  • NFC devices can be active or passive
  • Examples of NFC uses include:
    • Contactless payment systems
    • Automobile entertainment
    • Office and retail stores
    • Transportation

Radio Frequency Identification (RFID) Attacks

  • RFID is commonly used to transmit information between employee identification badges, inventory tags, and other paper-based tags
  • RFID tags are susceptible to different attacks
  • Most RFID tags are passive and do not have their own power supply

Wireless Local Area Network (WLAN) Attacks

  • A WLAN is designed to replace or supplement a wired LAN
  • WLAN versions include:
    • IEEE 802.11
    • IEEE 802.11a
    • IEEE 802.11b
    • IEEE 802.11g
    • IEEE 802.11n
    • IEEE 802.11ac
    • IEEE 802.11ax
  • WLAN hardware includes:
    • Wireless client network interface card adapters
    • Access points (APs)
  • WLAN attacks include:
    • Rogue access points
    • Evil twins
    • Intercepting wireless data
    • Wireless Denial of Service (DoS) attacks
    • Spoofing
    • Manipulating duration field values

Vulnerabilities of WLAN Security

  • Wired Equivalent Privacy (WEP) has vulnerabilities, including:
    • Short initialization vector (IV)
    • Repeatable IVs
  • Wi-Fi Protected Setup (WPS) has design and implementation flaws
  • MAC address filtering has vulnerabilities, including:
    • MAC addresses are initially exchanged in an unencrypted format
    • Managing a large number of addresses is challenging

Wireless Security Solutions

  • Wi-Fi Protected Access (WPA) and WPA2 are more secure than WEP
  • WPA2 addresses encryption and authentication
  • Wi-Fi Protected Access 3 (WPA3) is the next generation of WPA, with improvements including:
    • Simultaneous Authentication of Equals (SAE)
    • Individual data encryption
    • Improved interaction with Internet of Things (IoT) devices
  • Other security steps include:
    • Installation and configuration
    • Specialized systems communications
    • Rogue AP system detection

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on wireless network security fundamentals with this quiz based on Module 11 of CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition by Mark Ciampa. Questions cover wireless network attacks, vulnerabilities of WLAN security, and more.

More Like This

Use Quizgecko on...
Browser
Browser