Chapter 7 Quiz
For what use scenario was 802.11i PSK initial authentication mode (Personal Mode) created?
802.11i PSK was created for personal and home networks. This is because it only requires one access point, which performs the authentication function.
For what use scenario was 802.11i's 802.1X initial authentication mode created?
802.11i's 802.1X initial authentication mode should be used for companies with multiple access points
What happends when access points are too close together?
Co-Channel Interference
How might a security administrator use SNMP Get commands to access points?
Get commands to retrieve information about the access point What is the status? Security Standard? Temputure Level? TO CHANGE SETTINGS ON A ACCESS POINT WE SEND SET COMMAND
Are classic cluetooth and bluetooth low energy comaptible?
NO
Passive RFID chips have no batteries. How can they transmit when queried?
RFID scanner must scan the circut to power the circurt so that it can transmit information
Why is low speed and short distance usually good in the Internet of Things?
Saves the battery consumption
Why is device theft or loss a serious risk?
Serious problem because if lost device, someone can access all your infromation on that device Can connect to LAN to access corporate information as well!
Dangers of PreShared Key
User may share the preshared key with un-authroized users with others thinking that it is not a secret The passphrase to generate the pre-shared key is less than 20 characters because it will be a weak passphrase if less than 20 characters. If an employee leaves the company then they may not change the pre-shared key. THIS MUST BE CHANGED ON ALL THE DEVICES MANUALLY.
Which initial authentication mode or modes of 802.11i authentication use(s) a central authentication server?
802.1 X REQUIRES THE CENTRAL AUTHENTICATION SERVER
What is a PICONET
A master and its slaves A slave can be a apart of multiple pico nets because they can have several masters
What must a user know to authenticate his or her device to the access point?
A user must know their pre shared key with the access point when using PSK A user must know their credentials when using Enterprise mode
How is the access point used in Wi-Fi Direct?
Access point is used in Wi-Fi Direct is NOT USED THERE IS NO ACCESS POINT BECAUSE WIRELESS DEVICES COMMUNICATE WITH EACH OTHER DIRECTLY
Describe the process by which access point locations are determined.
Access point locations are determined by drawing a blueprint with access point circles that slightly overlap to display access point coverage In the center of each circle is where the access point will be placed Install the access point according to the blueprint that we have Test the signal and identify if there are any dead zones If there are dead zones then we must adjust the access points to perform another survey
Why is a short transmission range not a protection against eavesdroppers?
Amplifiers can capture the signals that you are sending HAcker with dish antenna and amplifier can capture the message sent in short transmission range
Who creates a rogue access point?
An employee working at the company because they want a increased signal in the organization
What type of attack did Ms. Davis use?
Betsy Davis had used a man in the middle attack
How do Bluetooth LE beacons differ from basic advertisement messages?
Bluetooth LE beacons different from basic advertisements are used to send basic information (Coupons, ONLY INFO IS DELIVERED WITH BEACON)
In general, how do Bluetooth LE profiles differ from Classic Bluetooth profiles? (You will have to think about this one a little.)
Bluetooth LE profiles are CREATED FOR Internet of Things Devices Classic Bluetooth profiles created for other devices
What are Bluetooth LE advertising messages?
Bluetooth advertising messages are broadcast to all devices, which are used to announce the EXISTENCE of other devices. Ask if they would like to connect with my device
Access Point blueprints
Circles are 10m in diameter Adjustments re made for walls and other obstacles Access points are pit in provisionally, while site surveys are utlized to make adjustments
What cryptographic protections does 802.11i provide?
Cryptographic protection provides: 1. Initial Authentication - Between the access point and the wireless client 2. Message by Message Protection -message-by-message confidentiality, integrity, and authentication (CIA) A drive-by hacker cannot read traffic (confidentiality), n1odi~ traffic (integrity), or connect to the access point to send traffic (authentication).
How can a drive-by hacker defeat a site's border firewall?
Drive by hackers can defeat a sites border firewalls by finding an unsecure access point and The attacker can send attack packets to any host and will be able to intercept at least son,e conversations within the customer premises.
What does the Wi-Fi Alliance call this 802.11i initial authentication mode?
ENTERPRISE MODE
Distinguish between evil twin access points and rogue access points.
Evil twin access point is a laptop that is impersonating access point -Hacker has bad intention to read and intercept networks -Send Malicious packets inside the network Rouge Access point is a REAL access point -Employee set up access point to get a higher signal -No malicious intentions
What does the evil twin do after initial association when the victim client transmits?
Evil twin will receive the frame from the victim It will decrypt the wireless frame then encapsulate the packet in a new frame and encrypt the new frame with EVIL TWIN encryption key Security connect 1 will use key client to evil twin VC to evil twin encrpytion Security connect 2 will use Evil twin to access point
Comment on the cost of central access point management.
Expensive, however over the long run it will save costs of manual labor
How are VPN s able to defeat evil twin attacks? Explain in detail.
First encryption is the VPN encryption Key between the server and the client Second encryption is the Victim Client encrpytion and Evil Twin Key Send to Evil Twin Evil twin decrypt with victim client encryption and evil twin key HOWEVER WHEN HE REACHES THE VPN KEY HE WILL BE UNABLE TO READ because it is between the server and the client VPN provides end to end private network security
What Bluetooth profile would you use for a game joystick, based on information in the text?
Human Interface Profile
What profile is used for desktop computers?
Human interface desgin i profile
What propagation issues are prevalent in zigbee, bluetooth and wireless in 2.4GHz?
ISSUE CO CHANNEL INTERFERENCE AND ELECTRO MAGNETIC INTERFERENCE ZIGBEE, BLUETOOTH, WIRELESS ALL IN 2.4 GHz
What kind of physical device is an evil twin access point?
Laptop
Distinguish between link security and end-to-end security.
Link security: Protection between the wireless access point and the wireless client device End to end security: Protection between the wireless client device and the server
Describe the state of cryptographic security for new transmission standards.
Mixed because some are weak and some are moderate Near Field example and Mirai Bot Example
How long must passphrases be to generate strong pre-shared keys?
More than 20 characters
Which initial authentication mode is used for message-by-message encryption, authentication, and message integrity?
Neither because both initial authentication utilize message by message protection
Does the choice of initial authentication mode change how later phases of 802.11i work?
No message by message by protection is the same for both modes.
Is there a single dominant IoT communication standard?
No there are many standards, but there is NO DOMINANT STANDARD
Do employees who set up rogue access points have malicious motives?
No they do not have to have malicious motives
Do public hot spots protect your transmissions?
No, they tend to be unsecure
What does it mean that Bluetooth uses one-to-one operation?
One-to-one operations mean two bluetooth devices have one dedicated connection Two bluetooth devices establish one dedicated connection
Contrast the use scenarios for initial authentication in PSK mode and 802.1X mode.
PSK mode is used for home residence and only have one access point 802.1 X mode (Enterprise) larger corporation with more than one access point
What is a PAN? (Do not just spell out the abbreviation.)
Personal Area Network is a collection fo small group of devices around a person's body or desk Bluetooth is used in personal area networks (PAN) Bluetooth is standardized bt BLUETOOTH SPECIAL INTEREST GROUP (SIG) NOT IEEE
What does the Wi-Fi alliance call PSK mode?
Personal Mode
What command does administrator send if they detect there is a problem in the network when reading the data?
Simple network protocol SET COMMANDS to access points to change power and channel
In what radio band or bands does Z-wave it operate?
Single band and operates at 800-900 MHz
What is a drive by hacker?
Someone that drives around physically to find an unsecure access point so that they can break into the system. Drive-by hackers use highly d irectional antennas that allow them to send very strong signals and to receive signals that would be too weak to hear with normal Wi-Fi equipment. Many use Pringles cans.
What profile is used to synchorizing information?
Synchronization profile
Why is this important to use VPN?
THIS IS IMPORTANT BECAUSE IT TELLS YOU TO USE VPN
What command should be send when there may be a rouge access point in the network
TRAP command should be sent
What does the Wi-Fi Alliance call 802.11i?
The WIFI ALLIANCE CALLS THIS WPA2 Also 802.11i/WPA2
What is the benefit of Bluetooth Low Energy?
The benefit of bluetooth low energy saves the battery life of the device. THESE DEVICES USE COIN BATTERYS
What initial authentication mode does 802.11i use?
The initial authentication mode that 802.11i uses is PRESHARED KEY and 802.1X
In what ways is the pairwise session key the user receives after authentication different from the PSK?
The pairwise session key is different from the pre shared key because it is a temporary key that is used for single communication between the device and the access point. This second key is temporary and it will rengenerate a new key each time a device connects
Why Rouge Access Point can they defeat 802.11i security?
These access points are unprotected in the network and have low level of security because they have been installed by an employee The weakest link access point determines the entire strength of the network
When two devices communicate using NFC, how close must they be?
They must be within a few inches, but touching is ideal
When must firms do site surveys to give users good service?
They must perform these frequently to ensure the signal is strong consistency over the course of time
What command does administrator send if they want to recive informaiton about access points
They should send a GET command to Query for errors of various types, power levels, power of nearby access points, et
How is this protection limited?
This is limited because the protection does not provide end to end protection
How does centralized management provide for the detection of rogue access points?
We can use simple network management to detect for rough access points by sending a TRAP MESSAGE to the network admin The network admin then will send GET command asking for the MAC ID or ADDRESS When access point sends their MAC address, the network admin will analyze the addresses and see if they are verified MAC addresses
Why do small IoT devices only implement Bluetooth LE?
We do not have the battery that support classic bluetooth WE do not have enough battery power to run classic bluetooth
Why would you not want to use high-speed Bluetooth all the time?
We do not want to use high speed bluetooth all the time because it can drain our battery
How often do we perform site surveys?
We must frequently perform these surveys because when employees bring in new objects they can sometimes interfere with the signals from the access points
What type of battery do very small Bluetooth LE devices require, and why is this important?
We use a COIN battery because we do not have to frequently have to change this battery These COIN batterys last longerr, however are slightly more expensive
Can a Bluetooth device be both a master and a slave simultaneously?
Yes
Is this still true if a master communicates with four slaves simultaneously?
Yes a master can communicate with four salves Master establishes one to one connection with each of the four devices\ Master can have seven slaves
Can a Bluetooth slave have two masters?
Yes up to seven
Can a Bluetooth master have multiple slaves?
Yes up to seven (PICONET)
When offered the choice when you are configuring a wireless access point, which WLAN security standard should you choose?
You should choose WPA2 because it is more secure, however if there is WPA3 you should choose that instead.
How can you tell if your client computer has succumbed to an evil twin attack?
You will not be able to tell
What other ad hoc networking protocol is widely used?
Z-Wave
Compare the roles of Zigbee controllers, Zigbee end devices, and Zigbee routers. In what radio bands does Zigbee operate?
Zigbee End Devices (Light switch) -Small IoT devices like lightblubs and switches Zigbee Controller -Connet Zigbee to the netowrk -Controller manages the Zigbee Network Zigbee (Router) -Extend the range of Zigbee network -Extended frames between end devices -ZIGBEE ROUTERS ARE CALLED ZIGBEE SWITCHES -Dual bands 800-900 MHz -You can connect up to 65,000 devices on a ZIGBEE NETWORK
What kind of network is Zigbee used for?
Zigbee is used for P2P protocol and used for ad hoc mesh network AD HOC MEANS SELF ORGANIZING AND SELF HEALING NETWORKS
What is end to end security?
all the Way between the Wireless client and the server on the wired LAN (or a server on the Internet).
What profile is used for printing
basic printing profile BPP
What is link security?
link between the wireless client and the wireless access point