Module 13: Wireless Network Security

Beschreibung

Module 13: Wireless Network Security
Alejandro López Villar
Quiz von Alejandro López Villar, aktualisiert more than 1 year ago
Alejandro López Villar
Erstellt von Alejandro López Villar vor mehr als 3 Jahre
3
0
1 2 3 4 5 (0)

Zusammenfassung der Ressource

Frage 1

Frage
WIFI -> IEEE 802.11 standar NOTE no es un protocolo sino un standar. Ventajas: -fast and easy -range Inconvenientes: -bandwidth -electronic equipment can interfere -security
Antworten
  • True
  • False

Frage 2

Frage
Wireless Terminologies [blank_start]BSSID[blank_end] The MAC address of an access point that has set up a Basic Service Set (BSS) I[blank_start]SM band[blank_end] A set of frequency for the international Industrial,scientific, and Medical communities [blank_start]Access Point[blank_end] Used to connect wireless devices to a wireless network [blank_start]Hotspot[blank_end] Places where wireless network is available for public use Orthogonal [blank_start]Frequency-division[blank_end] Mulüplexing (OFDM) Method of encoding digital data on multiple carrier frequencies DWect-sequence [blank_start]Spread Spec&um[blank_end] (DSSS) Original data signal is multiplied with a pseudo random noise spreading code Frequency-[blank_start]hopping Spread Spectrum[blank_end] (FHSS) Method of transmitting radio signals by rapidly switching a carrier among many frequency channels
Antworten
  • BSSID
  • SM band
  • Access Point
  • Hotspot
  • Frequency-division
  • Spread Spec&um
  • hopping Spread Spectrum

Frage 3

Frage
ISSD --> nombre de la red BSSID --> MAC del punto de acceso
Antworten
  • True
  • False

Frage 4

Frage
APRÉNDETELO .... 802.11A: More channels, high speed, and less interference 802.11B: Protocol of Wi-Fi revolution, de facto standard 802.11C: Operation of bridge connections 802.11D. Worldwide compliance with regulations for use of wireless signal spectrun 802.11E Quality of Service (QoS) support 802.11F Inter-Access Point Protocol 802.11G 54 Mbps standard, 2.4 GHz signaling 802.11H: Supports European regulatory requirements 802.11I Improves WLAN security 802.11J: Supports Japan regulatory requirements 802.11K. WLAN system management 802.11M: Maintains documentation 802.11N Multiple Input, Multiple Output (MIMO) antennas 802.11P Wireless Access for the Vehicular Environment 802.11R Supports fast roaming 802.11T Wireless Performance Prediction 802.11U: Internetworking with external networks 802.11V Wireless network management 802.16: Long distance wireless infrastructure (WiMAX) Bluetooth: Cable replacement option 900 MHz: Low speed, coverage, and backward compatibility
Antworten
  • True
  • False

Frage 5

Frage
Wireless Network Topology [blank_start]Wireless Local Area Network (WLAN)[blank_end]/ local Area Wireless Network ([blank_start]LAWN[blank_end]): WLAN technologies connect users within a local area. Area can be a corporate or campus building, or a public space, such as an airport. - uses wireless transmissions ratherthan wires to communicate between the nodes - The [blank_start]IEEE 802.11 group of standards[blank_end] specifies the tech nologies for wireless - [blank_start]High-frequency radio[blank_end] waves or in[blank_start]frared[blank_end] can be used as a carrier to communicate
Antworten
  • LAWN
  • IEEE 802.11 group of standards
  • Wireless Local Area Network (WLAN)
  • High-frequency radio
  • frared

Frage 6

Frage
Wireless Personal Area Network (WPAN): It is a [blank_start]short range[blank_end] and hoc network providing instantaneous connectivity to the user. Generally, it is known as Bluetooth - WPAN is a network for interconnecting devices [blank_start]close to an individual person's workspac[blank_end]e - It allows communication within a short range, i.e. about [blank_start]10 meters[blank_end] - This network can be made possible with network technologies such as [blank_start]IrDA[blank_end] (Infrared Data Association (IrDA)) and [blank_start]Bluetoo[blank_end]th - [blank_start]Bluetooth is the best example of[blank_end] a WPAN
Antworten
  • short range
  • close to an individual person's workspac
  • 10 meters
  • IrDA
  • Bluetoo
  • Bluetooth is the best example of

Frage 7

Frage
Wireless Metropolitan Area Network (WMAN): WMAN technologies allow users to communicate wirelessly between different locations within a metropolitan area. That area can encompass a university campus or multiple offices in a city - A WMAN is a wireless communication network that covers a metropolitan area - It connects the multiple WLANsover a [blank_start]range of 50 km[blank_end] - It offers broadband network access via [blank_start]exterior antennas[blank_end] - It normally uses w[blank_start]ireless infrastructure or optical fiber[blank_end] connections to link its sites
Antworten
  • range of 50 km
  • exterior antennas
  • ireless infrastructure or optical fiber

Frage 8

Frage
Wireless Wide Area Network (WWAN): It connects the notebooks and handheld computers to the Internet using digital cellular networks across [blank_start]far-reaching geographic area[blank_end] - A WWAN is similarto a WLAN ,but covers more area than WLAN - Its coverage is offered on a [blank_start]nationwide level[blank_end] - It allows usersto have access to the Internet, email, and corporate applications and information even while away from their office
Antworten
  • far-reaching geographic area
  • nationwide level

Frage 9

Frage
SSID -> unique name given to WLAN -- does NOT provide security --up to 32 characteres long --
Antworten
  • True
  • False

Frage 10

Frage
Types of Wireless Encryption The following are the various wireless encryption algorithms developed so far: -[blank_start]WEP[blank_end]: A WLAN data encryption protocol and it is an old, original wireless security standard that can be cracked easily. -[blank_start]WPA[blank_end]: It is a WLAN data encryption protocol using TKIP, MIC, and AES encryption. It uses a 48-bit IV, and TKIP encryption for wireless security -[blank_start]WPA2[blank_end]: WPA2 uses [blank_start]AES (128-bit) and CCMP[blank_end] for wireless data encryption. -[blank_start]WPA2 Enterpri[blank_end]se: It integrates [blank_start]EAP standards[blank_end] as WPA encryption. - -[blank_start]TKIP[blank_end]: A security protocol [blank_start]used in WPA as a replacement for WEP[blank_end] - -[blank_start]AES[blank_end]: It is a symmetric-key encryption, [blank_start]used in WPA2 as a replacement of T KIP[blank_end]. -[blank_start]LEAP[blank_end]: A proprietary WLAN authentication protocol [blank_start]developed by Cisco[blank_end]. Kerberos, -[blank_start]EAP[blank_end]: Supports multiple authentication methods, such as [blank_start]token cards, certificates, etc.[blank_end] -[blank_start]RADIUS[blank_end]: A centralized authentication and authorization management system [blank_start]-802.11 i :[blank_end] An IEEE standard that specifies security mechanisms for 802.11 wireless networks. -[blank_start]CCMP[blank_end]: CCMP uses AES with 128 bit keys and a 48-bit packet number for integrity and replay protection.
Antworten
  • WEP
  • WPA
  • WPA2
  • AES (128-bit) and CCMP
  • WPA2 Enterpri
  • EAP standards
  • TKIP
  • used in WPA as a replacement for WEP
  • AES
  • used in WPA2 as a replacement of T KIP
  • LEAP
  • developed by Cisco
  • EAP
  • token cards, certificates, etc.
  • RADIUS
  • -802.11 i :
  • CCMP

Frage 11

Frage
web - [blank_start]24 bit[blank_end] wap - [blank_start]48 bit[blank_end]
Antworten
  • 24 bit
  • 48 bit

Frage 12

Frage
WEP es un STREA CIPHER que usa RC4
Antworten
  • True
  • False

Frage 13

Frage
EXAMEN HAZ LAS TABLAS TANTAS VECES COMO NECESITES
Antworten
  • NONE

Frage 14

Frage
Temporal Key Integration Protocol (TKIP) The features of Temporal Key Integration Protocol (TKIP) are as follows: -[blank_start]RC4is[blank_end] the encryption algorithm used -It generates new key after every [blank_start]10kb (10.000 paquetes)[blank_end] -The [blank_start]initialization vector is hashed by TKIP[blank_end] -It checks for integrity of the message Advanced Encryption Standard (AES) has the following features: -Keys used are [blank_start]128/192/256 bits[blank_end] -Requires less [blank_start]memory[blank_end] -[blank_start]Data block[blank_end] size is 128 bits
Antworten
  • RC4is
  • 10kb (10.000 paquetes)
  • initialization vector is hashed by TKIP
  • 128/192/256 bits
  • memory
  • Data block

Frage 15

Frage
WPA recuerda . TKIP (Temporal Key Integrity Protocol): - TKIP utilizes the RC4 stream cipher encryption with 128-bit keys and 64-bit [blank_start]message integrity check (MIC).[blank_end] 128-bit Temporal Key: - Under TKIP, the client starts with a 128-bit '"temporal key" (TK) that is then [blank_start]combined with the client's MAC address[blank_end] and with an IV to create a key that is used to encrypt data via the RC4. It implements a sequence counter to protect against [blank_start]replay attacks.[blank_end]
Antworten
  • message integrity check (MIC).
  • combined with the client's MAC address
  • replay attacks.

Frage 16

Frage
WPA2 WPA2 offers two modes Of operation: [blank_start]WPA-Personal:[blank_end] -This version makes use of a setup password [blank_start](pre-shared key, PSK)[blank_end] and protects unauthorized network access. In PSK mode each wireless network device encrypts the network traffic [blank_start]using 128-bit key[blank_end] that is during the four-way handshake, and can be entered as a passphrase of 8 to 63 ASCOO characters. [blank_start]WPA-Enterprise:[blank_end] -This confirms the network user [blank_start]through a server.[blank_end] It includes [blank_start]EAP or RADIUS for centralized client[blank_end] authentication using multiple authentication methods, such as token cards, Kerberos, certificates etc. Users are assigned [blank_start]login credentials by a centralized serve[blank_end]r which they must present when connecting to the network.
Antworten
  • WPA-Personal:
  • (pre-shared key, PSK)
  • using 128-bit key
  • WPA-Enterprise:
  • through a server.
  • EAP or RADIUS for centralized client
  • login credentials by a centralized serve

Frage 17

Frage
Wi-Fi Chalking -- techniques to detect open wireless networks. [blank_start]WarWalking[blank_end]: To perform WarWalking, attackers walk around with Wi-Fi enabled laptops to detect open wireless networks. [blank_start]WarFlying/warstorming:[blank_end] WarFlying is an activity in which attackers fly around with Wi-Fi enabled laptops to detect open wireless networks. [blank_start]WarDriving:[blank_end] According to www.wordspy.com, WarDriving is a computer cracking technique that involves driving through a neighborhood with a wireless enabled notebook computer, mapping houses and businesses that have wireless access points. [blank_start]WarChalking[blank_end]: This term comes from whackers who [blank_start]use chalk[blank_end] (una marca) to place a special symbol on a sidewalk or another surface to indicate a nearby wireless network that offers Internet access. It is a method used to [blank_start]draw symbols[blank_end] in public places to advertise open Wi-Fi networks.
Antworten
  • WarWalking
  • WarFlying/warstorming:
  • WarDriving:
  • WarChalking
  • draw symbols
  • use chalk

Frage 18

Frage
WIRELESS THREATS [blank_start]ACCESS CONTROL ATTACKS[blank_end] Wireless access control attacks aim to [blank_start]penetrate a network[blank_end] by evading wireless LAN access control measures, such as AP MAC filters and Wi-Fi port access controls. There are several kinds of access control attacks. [blank_start]Integrity Attacks[blank_end] In integrity attacks, attackers send [blank_start]forged control, management, or data fram[blank_end]es over a wireless network to misdirect the wireless devices in order to perform another type of attack Wireless Threats: [blank_start]Confidentiality Attacks[blank_end] These attacks attempt to [blank_start]intercept confidential information[blank_end] sent over wireless associations, whether sent in the clear text or encrypted by Wi-Fi protocols. Wireless Threats: [blank_start]Availability Attacks[blank_end] These attacks aim at obstructing the delivery of wireless services to legitimate users, either by [blank_start]crippling those resources[blank_end] or by denying them access to WLAN resources. There are many attacks an attacker can use to obstruct the availability of wireless networks. Wireless Threats: [blank_start]Authentication Attacks[blank_end] The objective of authentication attacks is to [blank_start]steal the identity[blank_end] of Wi-Fi clients, their personal information, login credentials, etc. to gain unauthorized access to network resources Wireless Threats: [blank_start]Rogue Access Point Attack[blank_end] Unauthorized access points can allow anyone with an 802.11-equipped device onto the corporate network, which puts a potential attacker close to the mission-critical resources. Wireless Threats: [blank_start]DOS Attacks[blank_end] Denial of Service Attacks DOS is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have e DOS attacks disable the network by [blank_start]flooding network traffic[blank_end] Wireless Threats: [blank_start]Man in the Middle MITM[blank_end] A Man-in-the-Middle (MITM) attack is a type of attack in which attacker is able to [blank_start]read, insert, and modifythe message[blank_end] in between two users. This attack is also called TCP hijacking
Antworten
  • ACCESS CONTROL ATTACKS
  • penetrate a network
  • Integrity Attacks
  • forged control, management, or data fram
  • Confidentiality Attacks
  • intercept confidential information
  • Availability Attacks
  • crippling those resources
  • Authentication Attacks
  • steal the identity
  • Rogue Access Point Attack
  • DOS Attacks
  • flooding network traffic
  • Man in the Middle MITM
  • read, insert, and modifythe message

Frage 19

Frage
WIRELESS SECURITY Wireless Transportation Layer Security (WTLS) WTLS depend on the Transport Layer Security protocol (TLS) and it is a derivative of the [blank_start]secure socket layer protocol.[blank_end] Provides: -Privacy -Integrity of the data -Authenticacion Extensible Authentication Protocol (EAP) Methods Common methods used by EAP are as follows: TLS: It is a certificate based two way authentication (dos clientes) TTLS: This authentication uses certificates for the server side and a simple method forthe client side MD5: It is a challenge based password authentication LEAP: It is Cisco's proprietary username based authentication
Antworten
  • secure socket layer protocol.
Zusammenfassung anzeigen Zusammenfassung ausblenden

0 Kommentare

There are no comments, be the first and leave one below:

ähnlicher Inhalt

Imperialismus
sandya.zimmerman
ABSOLUTISMUS - LUDWIG XIV
Julian 1108
Biologie Zellbiologie
racheltschan89
Unsere Erde - Sonnensystem, Klima, Erdschichten etc.
rezension1
Bio-Sortiment
Sarah Huber
FOST 2 Deskriptive und explorative Datenanalyse
Kathy H
Vetie - Histo & Embryo II 2017
Fioras Hu
Gesko Werb Fragen
Adrienne Tschaudi
AVO & Klinische Pharmakologie 2013
Schmolli Schmoll
Vetie Spezielle Pathologie 2020
Fioras Hu