Wireless Network Security Quiz
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a method used for monitoring network traffic?

  • Employing a firewall to block all incoming connections
  • Deploying distributed denial-of-service attacks
  • Inserting a packet sniffer directly into the data stream
  • Using a switch with port mirroring (correct)

What is the function of a network tap?

  • To bypass firewall restrictions for faster access
  • To encrypt all transmitted data traffic
  • To prevent unauthorized access to the network
  • To monitor traffic between two network devices (correct)

Which of the following correctly describes Wi-Fi Protected Access (WPA)?

  • An obsolete encryption method requiring a static key
  • A personal security protocol for protecting wireless networks (correct)
  • An enterprise-level security model for wired networks
  • A proprietary VPN technology used for internet security

What distinguishes enterprise wireless security from personal wireless security?

<p>Personal security requires less complex authentication methods (A)</p> Signup and view all the answers

What was a key aspect of the initial IEEE 802.11 standard?

<p>Included security controls for protecting wireless transmissions (A)</p> Signup and view all the answers

What organization began developing standards for computer networking in the early 1980s?

<p>Institute of Electrical and Electronics Engineers (C)</p> Signup and view all the answers

Which of the following vulnerabilities is associated with open system authentication?

<p>Lack of authentication (B)</p> Signup and view all the answers

What is the maximum speed that the initial IEEE 802.11 WLAN standard supported?

<p>1-2 million bits per second (D)</p> Signup and view all the answers

Which security model succeeded WEP in wireless networks?

<p>WPA2 (B)</p> Signup and view all the answers

Which term refers to the process used to check for errors in data transmission within wireless security?

<p>Cyclic Redundancy Check (B)</p> Signup and view all the answers

Which of the following is NOT a feature of WPA2 security?

<p>Static keys (A)</p> Signup and view all the answers

What is the primary role of a Pseudorandom number generator (PRNG) in wireless security?

<p>Generating keys (D)</p> Signup and view all the answers

What critical aspect of wireless networks does controlling access primarily focus on?

<p>Restricting unauthorized user access (A)</p> Signup and view all the answers

What is a significant drawback of Open System Authentication?

<p>It is susceptible to unauthorized access without user verification. (D)</p> Signup and view all the answers

Which security protocol is known for its weaknesses and has been largely replaced by more secure standards?

<p>WEP (A)</p> Signup and view all the answers

What primary limitation does MAC Address Filtering present?

<p>It can be easily spoofed by attackers. (B)</p> Signup and view all the answers

What feature of WPA2 Personal Security enhances its reliability compared to WEP?

<p>It combines both a passphrase and a stronger encryption technique. (A)</p> Signup and view all the answers

Which statement accurately describes WPA Personal Security?

<p>It improves upon WEP by offering enhanced encryption. (D)</p> Signup and view all the answers

What does IEEE 802.11i specifically enhance compared to earlier wireless security protocols?

<p>It implements a standard framework for security across devices. (D)</p> Signup and view all the answers

What is one of the primary security features of WPA2 in enterprise environments?

<p>It supports individual authentication through a RADIUS server. (D)</p> Signup and view all the answers

Which of the following best describes a major improvement of WPA2 over WPA?

<p>It implements the AES encryption standard. (D)</p> Signup and view all the answers

What is a defining characteristic of a thin access point?

<p>It does not include authentication and encryption functions. (A)</p> Signup and view all the answers

What is one advantage of using wireless VLANs?

<p>They help to segment traffic and increase security. (C)</p> Signup and view all the answers

To enhance security, organizations often set up how many wireless VLANs?

<p>Two, one for employee access and one for guest access. (B)</p> Signup and view all the answers

Which tool is used for auditing the airwaves for rogue access points?

<p>Wireless protocol analyzer (A)</p> Signup and view all the answers

What does a wireless probe do in the context of network security?

<p>It monitors the RF frequency for unauthorized access points. (C)</p> Signup and view all the answers

What is typically included in the management of thin access points?

<p>All management is performed centrally through the wireless switch. (A)</p> Signup and view all the answers

Which type of probe is NOT typically mentioned in rogue access point discovery tools?

<p>Signal repeater probe (D)</p> Signup and view all the answers

What is the primary role of a wireless switch in an enterprise wireless network?

<p>To handle authentication and encryption for access points. (C)</p> Signup and view all the answers

Flashcards

WEP

An older wireless security protocol that is susceptible to various attacks, including IV attacks, replay attacks, and weak encryption.

WPA

A security protocol that provides greater security than WEP by using a stronger encryption algorithm (TKIP) and an improved key management system.

WPA2

A robust wireless security protocol that utilizes the Advanced Encryption Standard (AES) for encryption, providing a significant improvement over WEP and WPA.

IV Attack

A vulnerability that exploits weaknesses in the way WEP generates initialization vectors (IVs), allowing attackers to decrypt encrypted data.

Signup and view all the flashcards

Replay Attack

A vulnerability that involves capturing and replaying legitimate wireless traffic to gain access to a network or disrupt communication.

Signup and view all the flashcards

MAC Address Filtering

A security measure that allows only specific devices with predefined MAC addresses to access a wireless network. However, it is considered a weak security measure and can be bypassed easily.

Signup and view all the flashcards

Open System Authentication

A method of authentication that relies on an open access point, allowing any device to connect without authentication.

Signup and view all the flashcards

Misconfiguration

Improper configuration of network devices, including wireless routers and access points, is a common security vulnerability.

Signup and view all the flashcards

IEEE 802.11

A standard for wireless local area networks (WLANs) developed by the Institute of Electrical and Electronics Engineers (IEEE).

Signup and view all the flashcards

WEP (Wired Equivalent Privacy)

A type of wireless security protocol that uses a shared secret key to encrypt data transmitted between wireless devices and the access point. It is considered insecure and not recommended for use.

Signup and view all the flashcards

WPA (Wi-Fi Protected Access)

A type of wireless security protocol that uses a pre-shared key (PSK) to encrypt data and authenticate devices. It is an improvement over WEP and provides more secure communication. It uses the Temporal Key Integrity Protocol (TKIP) for encryption.

Signup and view all the flashcards

WPA2 (Wi-Fi Protected Access 2)

A type of wireless security protocol that uses the Advanced Encryption Standard (AES) for robust data encryption. It is considered the most secure wireless security protocol currently available.

Signup and view all the flashcards

Device Authentication

A type of authentication method that requires devices to provide credentials (usernames and passwords) to access a wireless network. It provides greater security compared to Open System Authentication.

Signup and view all the flashcards

WPA2 Enterprise

A wireless security protocol that provides a secure and reliable connection for enterprise networks. It uses an 802.1X authentication system and provides stronger authentication and encryption for corporate environments.

Signup and view all the flashcards

Pseudorandom Number Generator (PRNG)

A cryptographic function that generates a random number sequence used to create keys and other cryptographic elements. These sequences are unpredictable and statistically random, making them difficult to predict and break.

Signup and view all the flashcards

Thin Access Point

An access point that doesn't handle authentication or encryption, instead relying on a wireless switch for these functions.

Signup and view all the flashcards

WPA Enterprise Security

A type of security that uses 802.1x to authenticate users and then uses TKIP or AES to encrypt data.

Signup and view all the flashcards

WPA2 Enterprise Security

A type of security that uses 802.1x to authenticate users and then uses AES to encrypt data. It is generally considered more secure than WPA Enterprise.

Signup and view all the flashcards

Wireless VLANs

A wireless network can be divided into separate segments using VLANs, enhancing security and traffic management. This segmentation can be achieved by different devices, affecting the flexibility of configuration.

Signup and view all the flashcards

Rogue Access Point Discovery Tools

Tools like wireless protocol analyzers are used to detect unauthorized access points, potentially posing security risks to the network.

Signup and view all the flashcards

Wireless Probe

A special sensor used to monitor RF frequencies and detect unauthorized wireless access points.

Signup and view all the flashcards

Wireless Device Probe

A type of wireless probe that can be integrated into a wireless device like a laptop or smartphone, allowing mobile detection.

Signup and view all the flashcards

Desktop Probe

A type of wireless probe that can be used on a desktop computer, offering more powerful analysis capabilities.

Signup and view all the flashcards

Port mirroring

Method of monitoring network traffic by redirecting traffic from one or several ports to a designated monitoring port on the switch.

Signup and view all the flashcards

Network tap

A specialized network device installed between two network devices (e.g., switch, router) to monitor traffic passing through it.

Signup and view all the flashcards

Monitoring network traffic

A technique for identifying and resolving issues affecting network performance and security.

Signup and view all the flashcards

Study Notes

Wireless Network Security

  • Wireless security protocols aim to protect wireless LANs (WLANs) from unauthorized access and malicious activity.
  • Basic IEEE 802.11 wireless security protects WLANs.
  • Vulnerabilities exist in open-system authentication, Wired Equivalent Privacy (WEP), and device authentication.
  • WPA and WPA2 personal security models provide enhanced protection compared to older standards.
  • Enterprise wireless security often involves different security models than personal use security.

IEEE 802.11 Wireless Security Protections

  • The Institute of Electrical and Electronics Engineers (IEEE) created the 802.11 standard for WLAN architecture.
  • Early work, Project 802, began in the 1980s.
  • The 802.11 WLAN standard operates at speeds of 1 and 2 million bits per second (Mbps).
  • IEEE 802.11 revisions include a, b, g, and n.

Controlling Access

  • Controlling access to a Wireless Local Area Network (WLAN) limits device access to the access point (AP).
  • By restricting access to the AP, only authorized devices connect and join the network.
  • The IEEE 802.11 standard does not specify access control methods.
  • Media Access Control (MAC) address filtering is a common access control method implemented by most wireless AP vendors.
  • MAC address filtering typically permits or denies access based on MAC addresses.

Controlling Access (continued)

  • Wired Equivalent Privacy (WEP) aims to protect transmitted data from unauthorized viewing.
  • WEP encryption is designed to meet efficiency, exchangeability, and security.
  • WEP uses secret keys (minimum 64-bit). Available key options include 64-bit, 128-bit, and passphrase.
  • APs and devices can store up to four shared secret keys.
  • A default key is designated from the stored keys.

Controlling Access (continued)

  • WEP uses an initialization vector (IV) and a secret key to encrypt data.
  • The WEP encryption process involves several steps, including XOR operations and a pseudorandom number generator (PRNG).

Controlling Access (continued)

  • WLANs cannot limit access by walls or doors.
  • Open system authentication relies on matching service set identifiers (SSIDs).
  • The easiest way to find the SSID is by not doing anything.
  • Exploiting beaconing frames can reveal SSIDs.
  • A wireless device can attempt to associate with a network after receiving a beacon frame.
  • Issues can arise when the SSID is not broadcasted. Problems can arise with roaming. Devices running Microsoft Windows XP might be particularly vulnerable.
  • The SSID can be discovered in various network management frames sent by the AP, even when not explicitly included in beacon frames. Configuration preventing the display of the SSID does not completely solve the problem.
  • Wireless security can be improved by using multiple access points.

MAC Address Filtering Weaknesses

  • MAC addresses are often exchanged in clear text or unencrypted formats.
  • Attackers can observe MAC addresses to join the network.
  • Managing many MAC addresses can create challenges for security administrators.
  • MAC address filtering does not offer temporary guest access unless the MAC address is manually entered.

WEP

  • The WEP protocol uses a 64-bit or 128-bit encryption key.
  • An initialization vector (IV) combines with the secret key to encrypt packets.
  • Short default key lengths in WEP decrease its security strength.
  • Anything that creates easily detectable patterns in cryptography should be avoided.
  • WEP's IVs can repeat in a short time frame, making it susceptible to attacks.

WEP (continued)

  • Collisions occur when two packets use the same initialization vector (IV) but have different data.
  • A keystream attack exploits the repetition of IVs in WEP.
  • The attack determines the keystream by analyzing two packets with the same IV.

Personal Wireless Security

  • WPA and WPA2 security from the Wi-Fi Alliance have been commonly adopted for personal devices.
  • The security measures involved in WPA and WPA2 ensure encryption and authentication.
  • WPA consists of two components: preshared key (PSK) and temporal key integrity protocol (TKIP).

WPA Personal Security

  • The Wireless Ethernet Compatibility Alliance (WECA), renamed to Wi-Fi Alliance, promotes wireless network technology.
  • Wi-Fi Protected Access (WPA) was designed to protect both present and future wireless devices, addressing both authentication and encryption.
  • WPA uses PSK authentication.
  • When using PSK, a passphrase generates the encryption key.
  • The PSK is not used directly for encryption but serves as a seed for mathematically generating the keys.
  • WPA uses Temporal Key Integrity Protocol (TKIP).
  • TKIP uses a 128-bit key, per-packet keys, and strong security measures.

WPA Personal Security (continued)

  • WPA also uses message integrity checks (MICs) in place of WEP's cyclic redundancy checks (CRCs) to prevent data tampering.

WPA2 Personal Security

  • Wi-Fi Protected Access 2 (WPA2) was introduced in September 2004.
  • WPA2 enhances the security and encryption of data over previous standards.
  • WPA2 uses preshared key (PSK) authentication.
  • PSK keys are frequently changed.
  • The period for changing the keys is known as the rekey interval.
  • WPA2 PSK key management is prone to weaknesses like manual key distribution, which lack security. WPA2 PSK keys are weak if not complex.
  • A PSK is 64 bits. Passphrases can contain 8-63 characters, but shorter phrases are more vulnerable.
  • WPA2 uses AES-CCMP encryption.
  • CCMP employs Counter Mode with CBC-MAC; AES is the encryption algorithm.

WPA2 Personal Security (continued)

  • The security mechanisms in WPA2 Enterprise ensure high data security.
  • Authentication is achieved using IEEE 802.1x, and encryption is handled by AES-CCMP.

Enterprise Wireless Security

  • Enterprise wireless security options often involve the IEEE 802.11i standard, or WPA and WPA2 models.
  • Thin access point APs do not handle authentication and encryption; the switch handles those activities.
  • Wireless LANs (VLANs) can segment network traffic for security.

Enterprise Wireless Security Devices

  • Wireless protocol analyzers are used in detecting rogue access points.
  • Specialized wireless probes detect rogue access points by monitoring the radio frequencies. Different types of wireless probes, such as access point probes or dedicated probes, are available.
  • VLANs improve security by segmenting network traffic into separate virtual networks.

Network Vulnerabilities

  • Network vulnerabilities are categorized as either media-based or device-based.
  • Media-based vulnerabilities include monitoring network traffic patterns.
  • A network tap or port mirroring can capture network traffic for monitoring or troubleshooting.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Wireless Network Security PDF

Description

This quiz covers the key concepts of wireless network security, focusing on protocols designed to protect Wireless LANs (WLANs). It discusses the vulnerabilities in wireless security standards such as WEP, as well as the advancements in WPA and WPA2 models. Test your understanding of IEEE 802.11 standards and access control in WLANs.

More Like This

Wi-Fi teemaline teadmiste test
9 questions
WEP Security and WLAN Standards Quiz
21 questions
Use Quizgecko on...
Browser
Browser