Podcast
Questions and Answers
An attacker intercepts an HTTPS public encryption key and decrypts login credentials. What type of vulnerability is primarily exploited in this scenario?
An attacker intercepts an HTTPS public encryption key and decrypts login credentials. What type of vulnerability is primarily exploited in this scenario?
- Session Hijacking
- Brute Force Attack
- Replay Attack
- Man-in-the-Middle Attack (correct)
What type of WLAN attack is specifically mitigated by using a per-MPDU TKIP sequence counter (TSC)?
What type of WLAN attack is specifically mitigated by using a per-MPDU TKIP sequence counter (TSC)?
- Weak-IV attack
- Forgery attack
- Bit-flipping attack
- Replay attack (correct)
A small business is using consumer-grade wireless routers. Which security measure is the most appropriate to implement to secure the wireless network?
A small business is using consumer-grade wireless routers. Which security measure is the most appropriate to implement to secure the wireless network?
- WPA2-Enterprise
- WPA-Enterprise
- WPA2-Personal (correct)
- 802.1X/EAP-PEAP
Which of the following is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
Which of the following is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
After capturing network traffic, you observe authentication and association frames, followed by DHCP and ISAKMP protocol packets. What security solution is likely represented?
After capturing network traffic, you observe authentication and association frames, followed by DHCP and ISAKMP protocol packets. What security solution is likely represented?
A Windows laptop has a dual-band Wi-Fi adapter. Which wireless frequency band would potentially offer less interference in a crowded area with multiple access points?
A Windows laptop has a dual-band Wi-Fi adapter. Which wireless frequency band would potentially offer less interference in a crowded area with multiple access points?
Given the previous scenario, to mitigate common threats, which encryption protocol is best suited if we use WPA2-Personal?
Given the previous scenario, to mitigate common threats, which encryption protocol is best suited if we use WPA2-Personal?
In a WPA2-Personal scenario, what kind of key is used for the actual data encryption once the shared secret has been initially established during authentication?
In a WPA2-Personal scenario, what kind of key is used for the actual data encryption once the shared secret has been initially established during authentication?
Which of the following topics should be included in end-user training for password selection and acceptable network use?
Which of the following topics should be included in end-user training for password selection and acceptable network use?
What is the most appropriate way for a wireless security professional to address rogue access points within a large organization's network?
What is the most appropriate way for a wireless security professional to address rogue access points within a large organization's network?
Before creating a WLAN security policy, what is the most essential prerequisite for ABC Hospital?
Before creating a WLAN security policy, what is the most essential prerequisite for ABC Hospital?
In which deployment scenario is peer-to-peer traffic blocking most beneficial?
In which deployment scenario is peer-to-peer traffic blocking most beneficial?
Which of these authentication technologies is capable of setting up a TLS tunnel between the client device and the authentication server?
Which of these authentication technologies is capable of setting up a TLS tunnel between the client device and the authentication server?
What specific action should a wireless professional take to mitigate the biggest risk posed by rogue access points?
What specific action should a wireless professional take to mitigate the biggest risk posed by rogue access points?
What initial step is crucial before developing a robust WLAN security policy for ABC Hospital?
What initial step is crucial before developing a robust WLAN security policy for ABC Hospital?
In which situation is it most critical to block peer-to-peer traffic on a Wi-Fi network?
In which situation is it most critical to block peer-to-peer traffic on a Wi-Fi network?
Which of the following security measures BEST addresses the requirement to limit network permissions for a guest hot-spot to only internet access?
Which of the following security measures BEST addresses the requirement to limit network permissions for a guest hot-spot to only internet access?
What is the primary purpose of implementing a captive portal with HTTPS login for a guest WLAN?
What is the primary purpose of implementing a captive portal with HTTPS login for a guest WLAN?
In the 802.1X/EAP framework, what event directly precedes the opening of the 802.1X controlled port?
In the 802.1X/EAP framework, what event directly precedes the opening of the 802.1X controlled port?
Why does the 802.1X Uncontrolled Port open while the Controlled Port is still blocked after 802.1X/EAP is successful?
Why does the 802.1X Uncontrolled Port open while the Controlled Port is still blocked after 802.1X/EAP is successful?
What was a significant obstacle that hindered early adoption of Opportunistic Key Caching (OKC)?
What was a significant obstacle that hindered early adoption of Opportunistic Key Caching (OKC)?
Why is it recommended to use different VLANs for corporate and guest WLANs in addition to separate controllers?
Why is it recommended to use different VLANs for corporate and guest WLANs in addition to separate controllers?
Which security control helps prevent guest users from associating their device to the corporate WLAN?
Which security control helps prevent guest users from associating their device to the corporate WLAN?
Why is it important for a hot-spot to limit access to network resources as much as possible?
Why is it important for a hot-spot to limit access to network resources as much as possible?
ABC company is upgrading their WLAN infrastructure to support Voice over Wi-Fi, what is a primary security concern given that most Voice over Wi-Fi phones do not support IPSec?
ABC company is upgrading their WLAN infrastructure to support Voice over Wi-Fi, what is a primary security concern given that most Voice over Wi-Fi phones do not support IPSec?
What is the most appropriate security solution to implement when upgrading to Voice over Wi-Fi and needing to replace WEP with IPSec?
What is the most appropriate security solution to implement when upgrading to Voice over Wi-Fi and needing to replace WEP with IPSec?
What is the role of LDAP when used in a WLAN authentication solution?
What is the role of LDAP when used in a WLAN authentication solution?
Which of the following security protocols provides mutual authentication without the need for X.509 certificates?
Which of the following security protocols provides mutual authentication without the need for X.509 certificates?
An 802.1X/EAP is being used for wireless authentication, with a controller and 7 access points, what is the most common role of Radius in this solution?
An 802.1X/EAP is being used for wireless authentication, with a controller and 7 access points, what is the most common role of Radius in this solution?
Given an 802.1X/EAP-based wireless security solution, with a WLAN controller and 7 APs, what is the purpose of the EAP protocol?
Given an 802.1X/EAP-based wireless security solution, with a WLAN controller and 7 APs, what is the purpose of the EAP protocol?
What is the primary difference between EAP-FAST, and EAP-TLS?
What is the primary difference between EAP-FAST, and EAP-TLS?
Why might an organization choose to implement WPA2-Enterprise over WPA-Personal?
Why might an organization choose to implement WPA2-Enterprise over WPA-Personal?
What is a primary difference between EAP-TTLS and EAP-TLS regarding authentication credentials?
What is a primary difference between EAP-TTLS and EAP-TLS regarding authentication credentials?
In a WPA2-Enterprise setup, how does the WLAN controller receive group assignments for authenticated users to apply specific security profiles?
In a WPA2-Enterprise setup, how does the WLAN controller receive group assignments for authenticated users to apply specific security profiles?
What is the specific role of the Pairwise Transient Key (PTK) within IEEE 802.11 authentication and key management?
What is the specific role of the Pairwise Transient Key (PTK) within IEEE 802.11 authentication and key management?
Which technology would need to be implemented to support a TSN due to legacy wireless equipment that doesn't support AES encryption, when it wouldn't be necessary in an 802.11-2012 compliant network?
Which technology would need to be implemented to support a TSN due to legacy wireless equipment that doesn't support AES encryption, when it wouldn't be necessary in an 802.11-2012 compliant network?
What is the primary difference in the way EAP-TTLS and EAP-TLS handle client authentication?
What is the primary difference in the way EAP-TTLS and EAP-TLS handle client authentication?
In the context of WPA2-Enterprise, what is the immediate effect of a RADIUS server returning a group name to the WLAN controller during user authentication?
In the context of WPA2-Enterprise, what is the immediate effect of a RADIUS server returning a group name to the WLAN controller during user authentication?
Why is the Pairwise Transient Key (PTK) specific to unicast data frame encryption, and not used for other traffic?
Why is the Pairwise Transient Key (PTK) specific to unicast data frame encryption, and not used for other traffic?
Why might an administrator choose to implement WEP for older wireless equipment given the potential security risks?
Why might an administrator choose to implement WEP for older wireless equipment given the potential security risks?
Joe is unable to connect to ABC Company's 802.11 WLAN. Given that his laptop is authorized and the environment includes WIPS, what is the most likely cause of his connectivity issue?
Joe is unable to connect to ABC Company's 802.11 WLAN. Given that his laptop is authorized and the environment includes WIPS, what is the most likely cause of his connectivity issue?
ABC Company uses an overlay WIPS with dipole antenna sensors to locate rogue devices. Which of the following techniques can the 802.11 based platform use to determine the location of rogue devices?
ABC Company uses an overlay WIPS with dipole antenna sensors to locate rogue devices. Which of the following techniques can the 802.11 based platform use to determine the location of rogue devices?
In a Single Channel Architecture (SCA) network, what key characteristic is shared across all Access Points (APs)?
In a Single Channel Architecture (SCA) network, what key characteristic is shared across all Access Points (APs)?
In ABC Company's Single Channel Architecture (SCA) network, which authentication method is exclusively used?
In ABC Company's Single Channel Architecture (SCA) network, which authentication method is exclusively used?
In an SCA environment with a Voice over Wi-Fi client (STA-1) moving throughout the network, what best describes the changes that are happening?
In an SCA environment with a Voice over Wi-Fi client (STA-1) moving throughout the network, what best describes the changes that are happening?
What is the primary purpose of ABC Company's WIPS termination policy?
What is the primary purpose of ABC Company's WIPS termination policy?
What is a key factor that makes a Single Channel Architecture (SCA) beneficial for client roaming?
What is a key factor that makes a Single Channel Architecture (SCA) beneficial for client roaming?
Joe’s laptop is attempting to connect to a PEAPv0/EAP-MSCHAPv2 network and failing. What is the most likely reason for the failure, given the company’s WIPS policy?
Joe’s laptop is attempting to connect to a PEAPv0/EAP-MSCHAPv2 network and failing. What is the most likely reason for the failure, given the company’s WIPS policy?
Flashcards
What type of attack involves intercepting a server's public encryption key and decrypting login credentials?
What type of attack involves intercepting a server's public encryption key and decrypting login credentials?
A WLAN attack where an attacker intercepts the HTTPS public encryption key from a web server and decrypts login credentials in real-time.
What WLAN attack is prevented by a per-MPDU TKIP sequence counter (TSC)?
What WLAN attack is prevented by a per-MPDU TKIP sequence counter (TSC)?
A security measure in TKIP (Temporal Key Integrity Protocol) that uses a unique counter to prevent replay attacks. The counter is incremented for each MPDU (MAC Protocol Data Unit) transmitted, ensuring that each frame is unique.
What security measure can you implement on a consumer-grade wireless router to enhance security?
What security measure can you implement on a consumer-grade wireless router to enhance security?
A security solution that uses a unique pre-shared key (PSK) to encrypt wireless traffic. This is the most basic and common security solution for home and small business networks.
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
Signup and view all the flashcards
What security solution is represented by the following protocol messages: auth req, auth rsp, assoc req, assoc rsp, DHCP communication, and ISAKMP packets?
What security solution is represented by the following protocol messages: auth req, auth rsp, assoc req, assoc rsp, DHCP communication, and ISAKMP packets?
Signup and view all the flashcards
Which security solution utilizes AES-CCMP encryption for robust data protection?
Which security solution utilizes AES-CCMP encryption for robust data protection?
Signup and view all the flashcards
Describe the functionality of 802.1X/EAP-TTLS in a network setting.
Describe the functionality of 802.1X/EAP-TTLS in a network setting.
Signup and view all the flashcards
Identify the function of 802.1X/PEAPv0/MS-CHAPv2 in securing network access.
Identify the function of 802.1X/PEAPv0/MS-CHAPv2 in securing network access.
Signup and view all the flashcards
Rogue APs in Security Policy
Rogue APs in Security Policy
Signup and view all the flashcards
WPA2-Enterprise
WPA2-Enterprise
Signup and view all the flashcards
Hiding SSID for Rogue APs
Hiding SSID for Rogue APs
Signup and view all the flashcards
Spectrum Analysis for Rogue APs
Spectrum Analysis for Rogue APs
Signup and view all the flashcards
WIPS for Rogue Detection
WIPS for Rogue Detection
Signup and view all the flashcards
Port Security for Rogue APs
Port Security for Rogue APs
Signup and view all the flashcards
Management Support for WLAN Policy
Management Support for WLAN Policy
Signup and view all the flashcards
Peer-to-Peer Blocking
Peer-to-Peer Blocking
Signup and view all the flashcards
EAP-FAST
EAP-FAST
Signup and view all the flashcards
WPA-Personal
WPA-Personal
Signup and view all the flashcards
802.11
802.11
Signup and view all the flashcards
IPSec VPN
IPSec VPN
Signup and view all the flashcards
Voice over Wi-Fi
Voice over Wi-Fi
Signup and view all the flashcards
Fast Secure Roaming
Fast Secure Roaming
Signup and view all the flashcards
Multi-factor Authentication
Multi-factor Authentication
Signup and view all the flashcards
Guest Network Security Requirements
Guest Network Security Requirements
Signup and view all the flashcards
Separate Controllers for Guest and Corporate WLANs
Separate Controllers for Guest and Corporate WLANs
Signup and view all the flashcards
Wireless Intrusion Prevention System (WIPS)
Wireless Intrusion Prevention System (WIPS)
Signup and view all the flashcards
Access Control Lists (ACLs) for Guest WLAN
Access Control Lists (ACLs) for Guest WLAN
Signup and view all the flashcards
Captive Portal Authentication and VLAN Separation
Captive Portal Authentication and VLAN Separation
Signup and view all the flashcards
4-Way Handshake in 802.1X/EAP
4-Way Handshake in 802.1X/EAP
Signup and view all the flashcards
Opportunistic Key Caching (OKC) Drawbacks
Opportunistic Key Caching (OKC) Drawbacks
Signup and view all the flashcards
OKC Challenges
OKC Challenges
Signup and view all the flashcards
EAP-TTLS vs EAP-TLS
EAP-TTLS vs EAP-TLS
Signup and view all the flashcards
How do authenticated users get assigned to groups in a WLAN controller with WPA2-Enterprise security?
How do authenticated users get assigned to groups in a WLAN controller with WPA2-Enterprise security?
Signup and view all the flashcards
What is the PTK in IEEE 802.11?
What is the PTK in IEEE 802.11?
Signup and view all the flashcards
How are security profiles assigned in a WLAN controller with WPA2-Enterprise security?
How are security profiles assigned in a WLAN controller with WPA2-Enterprise security?
Signup and view all the flashcards
What is WPA2-Enterprise security and how does it work?
What is WPA2-Enterprise security and how does it work?
Signup and view all the flashcards
What is the Pairwise Master Key (PMK) in IEEE 802.11?
What is the Pairwise Master Key (PMK) in IEEE 802.11?
Signup and view all the flashcards
Which encryption technology would you use to support legacy devices in an 802.11-2012 wireless network?
Which encryption technology would you use to support legacy devices in an 802.11-2012 wireless network?
Signup and view all the flashcards
What does WIPS stand for?
What does WIPS stand for?
Signup and view all the flashcards
What is a WIPS termination policy?
What is a WIPS termination policy?
Signup and view all the flashcards
What is a rogue access point?
What is a rogue access point?
Signup and view all the flashcards
What is a rogue station?
What is a rogue station?
Signup and view all the flashcards
What is a DoS attack?
What is a DoS attack?
Signup and view all the flashcards
What is unauthorized roaming?
What is unauthorized roaming?
Signup and view all the flashcards
What is TDoA (Time Difference of Arrival)?
What is TDoA (Time Difference of Arrival)?
Signup and view all the flashcards
What is trilateration?
What is trilateration?
Signup and view all the flashcards
Study Notes
CWSP-207 Study Notes
-
Course is CWSP-207
-
Total questions: 119
-
Topic 1: Vulnerabilities, Threats, and Attacks
- An attack is in progress, but the attacker has not gained access to any files. This describes a denial-of-service (DoS) attack.
- WLAN attacks exploit specific vulnerabilities such as management interface exploits, zero-day exploits, RF DoS, hijacking attacks, and social engineering attacks. These can be used to gain credentials or disrupt communication.
- 802.11n access points at airports are susceptible to man-in-the-middle attacks and Wi-Fi phishing attacks.
- ABC Corporation should be advised against using MS-CHAPv2 for their WLAN security, as it is vulnerable to offline dictionary attacks and not secure for WPA2-Enterprise implementations. LEAP is secure only when used within a TLS-encrypted tunnel.
-
Topic 1 (continued) -Wireless attacks such as rogue APs, DoS, and eavesdropping can't be detected by WIPS solutions of any kind.
- Social engineering is a security attack that cannot be detected by WIPS software solutions. -In a WLAN security penetration exercise, obtaining the WEP key allows an attacker to decrypt other users' traffic. To recreate encryption keys using a protocol analyzer three inputs are required: authenticator nonce, supplicant nonce, and authenticator address (BSSID). -802.11w protects against RF DoS and Layer 2 disassociation attacks.
- When using a wireless aggregator utility to combine multiple packet captures the utility is likely being used for troubleshooting wireless adapter failures and performing a interference source location test.
-
Topic 1 (continued)
- WPA2 Personal uses Open System authentication followed by a 4-Way Handshake resulting in easily performed hijacking attacks.
-
Topic 2: Security Policy
- A security policy that requires VPN software for connectivity to the corporate network will help mitigate peer-to-peer attacks when laptops are used on public access networks.
- Password complexity and regular changes to static passwords in a security policy help to mitigate vulnerabilities.
- Strong authentication, encryption, and robust security methods should be addressed by a WLAN security policy to provide a secure network for users to access sensitive information such as corporate data, file shares, intranet web servers, or internet network access.
-
Topic 3: WLAN Security Design and Architecture
- EAP-MD5, EAP-TLS, PEAPv0/MSCHAPv2 technologies are used, establishing a TLS tunnel between the supplicant and the authentication server.
- When CCMP is used for protection of data frames, 16 bytes of overhead are added to Layer 2 frames. Eight of these bytes make up the MIC (message integrity code) Layer of validation to ensure that the wireless receiver does not incorrectly process corrupted signals, The MIC a hash computation against the MAC Header to detect replay attacks.
- WPA2-Personal authentication and AES-CCMP encryption protect the MSDU contents of the 802.11 frames from eavesdroppers.
-
Topic 3 (continued)
- EAP-TLS will not protect the client's username and password within an encrypted tunnel used as a security solution. This is a disadvantage when comparing PEAPv0 EAP/MSCHAPv2.
- 802.1x/EAP-TTLS and PEAPv0/MSCHAPv2 authentication protocols are used for securing corporate WLAN data. Each group's security settings are configured in the WLAN controller for their respective VLANs. When authenticated users are assigned to groups their access to data is controlled according to the security policies.
- A common issue is security issues and user conflicts caused by having corporate and guest accounts on the same WLAN. Using a different controller for guest networks is a good solution.
- Offline dictionary attacks can be used to gain wireless network access, but will not decrypt data traffic from other users.
-
Additional Topics (as applicable)
- Wireless security attacks,
- Wireless security solutions,
- Wireless security policies
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on wireless security vulnerabilities and solutions. This quiz covers common attacks, network security criteria, and encryption protocols suitable for a secure wireless network. Ideal for those aiming to enhance their understanding of WLAN security measures.