Chapter 12 Wireless Networking
What is the maximum number of characters that can exist within an SSID name? 10 12 26 32
32
What type of encryption is currently used to secure WPA2?
AES
CSMA/CD is implemented at the data link layer on wireless networks. true or false
false
If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?
RADIUS Server
Characteristics of 802.11ac
1 Gbps, 5 GHz standard
Which encryption protocol below is used in the WPA2 standard? AES-CCMP AES-CTR AES-TKIP AES-SCMP
AES-CCMP
Characteristics of 802.11b
Enhancements to 802.11 to support 5.5 Mbps and 11 Mbps 2.4 GHz (unlicensed radio band at the rivers a maximum data rate of 11 Mbps) Uses a modulation technique called Direct Sequence Spread Spectrum (DSSS) Have the ability to data-rate-shift while moving. introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected. (to optimize performance, it's recommended that you disable the 802.11b-only modes on all your access points)
Which of the following choices is not one of the four types of packets used by EAP? Request Response Success Error
Error
Bluetooth is an example of what type of technology below? Small Area Network Private Area Network Personal Area Network Limited Area Network
Personal Area Network
What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?
WiFi Pineapple
When using AES-CCMP, the AES-256 bit key requires how many rounds? 4 10 13 15
13
Characteristics of 802.11g
54 Mbps (max data rate), 2.4 GHz standard (backward compatible with 802.11b) uses a modulation technique called Orthogonal Frequency Division Multiplexing (OFDM). When 802.11g clients are operating at the 802.11b rates (11 Mbps, 5.5 Mbps, 2 Mbps, and 1 Mbps), they're actually using the same modulation 802.11b uses
Characteristics of 802.11a
54 Mbps, 5 GHz standard, 12 non-overlapping frequency channels Immune to interferences from devices that operate in the 2.4 GHz band (like microwave ovens, cordless phones, and Bluetooth devices) even when being used in the same physical environment as 802.11b users. Have the ability to data-rate-shift while moving. (allow the person operating at 54 Mbps to shift to 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, and 9 Mbps, and finally, still communicate farthest from the AP at 6 Mbps)
Carrier Sense Multiple Access/Collision Detection. (CSMA/CD)
A MAC protocol that allows collisions to occur but has methods for detecting and recovering from them.See also collision and Media Access Control(MAC).
Characteristics of 802.11n
Allows for communication at both the 2.4 GHz and 5 GHz frequencies by using Channel Bonding. Higher throughput improvements using multiple-input, multiple-output (MIMO) antennas (which employs multiple transmitters and receiver antennas to increase data throughput). Can have up to 8 antennas, but most APs use 4. These are sometimes referred to as Smart Antennas, where if you did have 4 of them, 2 would be used for transmitting simultaneously with the other 2 receiving simultaneously. This setup allows for much higher data rates than the others discussed. 40 MHz Channels: which double the speed + 11 Mbps from not wasting side tones (so 54 to 108 + 11 = 119 Mbps) MAC Efficiency: 802.11 protocols require acknowledgment of each and every frame. 802.11 can pass many packets before an acknowledgment is required, which saves you on overhead. This is called block acknowledgment. Multiple-Input, Multiple-Output (MIMO): Several frames are sent by several antennas over several paths and are then recombined by another set of antennas to optimize throughput and multipath resistance. This is called Spatial Multiplexing
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? Bluesnarfing Bluejacking Bluecracking Bluetalking
Bluejacking
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? Bluejacking Bluecracking Bluesnarfing Bluetalking
Bluesnarfing
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? Gateway access point Captive portal access point Wireless device probe AUP Enforcement access point
Captive portal access point
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the ____. a. Network Link layer b. Data Link layer c. transport layer d. session layer
Data Link layer
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: EAP-MSCHAPv2 EAP-AKA EAP-FAST EAP-SIM
EAP-FAST
overlapping channels (2.4 GHz)
In the United States, only 11 channels are configurable, what channels 1, 6, and 11 being non-overlapping. This allows you to have three access points in the same area without experiencing interference. You must be aware of the channels when installing APs In a large environment so you do not overlap channels. (if you configure one AP with channel one, and then the next AP would be configured in channel 11, the channel farthest from that configured on the first AP)
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? LEAP TKIP EAP PEAP
LEAP
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? TKIP LEAP PEAP ICMP
PEAP
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
The IEEE 802.11 standard protocol for WLANs that attempts to prevent multiple wireless devices from transmitting at the same time. Also has an optional implementation called a Request to Send, Clear to Send (RTS/CTS) because of the way that hosts must communicate with the access point (AP). For every packet sent, and RTS/CTS and acknowledgment must be received in the process
Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network?
access point (AP)
Which option below is responsible for the issuing of EAP request packets? supplicant authenticator authentication server proxy
authenticator
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? active twin authorized twin internal replica evil twin
evil twin
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? random sanctioned rogue legitimate
rogue
Goodput
the amount of usable data that crosses a given point in a network over a certain period of time. (It's the actual data throughout)