Chapter 8 Security
What is the program that monitors a virtual machine called?
Hypervisor
Evil Twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead.
Controller APs
An AP that is managed through a dedicated wireless LAN controller (WLC).
Protected EAP (PEAP)
An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords. Creates encrypted channel between the client and the authentication server.
Wired Equivalent Privacy (WEP)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure. Encrypts plaintext into ciphertext.
Wi-Fi Protected Setup (WPS)
An optional means of configuring security on wireless local area networks.
rogue access point (rogue AP)
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
rogue access point
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. Usually set up by an insider (employee).
_________________________ is an attack that sends annoying and unsolicited messages to Bluetooth-enabled device while ____________________ is an attack that accesses information from a wireless device through a Bluetooth connection.
Bluejacking; Bluesnarfing
WPA Enterprise
Intended for larger enterprises, schools, and government agencies
Wi-Fi Protected Access (WPA)
Introduced in 2003 by the Wi-Fi Alliance. Handles both encryption and authentication.
Three types of WLAN attacks are __________________, evil twin, and ___________________.
Rogue Access; Wireless Replay
In addition to WEP and WPS, the vulnerabilities of other IEEE security options were discussed in this LSA including MAC address filtering and __________________.
Service Set Identifier (SSID)
What range can bluetooth go up to?
800ft
Temporal Key Integrity Protocol (TKIP)
A WPA encryption technology.
Extensible Authentication Protocol (EAP)
A framework for transporting authentication protocols that defines the format of the messages.
Service Set Identifier (SSID)
A network name that wireless routers use to identify themselves.
Wireless replay attack
A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker's presence being detected. Also known as "hijacking".
IEEE 802.11n
A proposed standard for faster wireless LANs projected to be ratified in 2009.
Wireless Security Solutions
A unified approach to WLAN security needed; thus, the Wi-Fi Alliance began developing security solutions. Include WPA and WPA2.
Bluetooth
A wireless technology that uses short-range radio frequency transmissions.
Evil twin AP
AP set up by an attacker. Mimics an authorized AP.
access point (AP)
Acts as a bridge between wireless and wired networks. Can connect to wired network by a cable.
What are the four types of packets used by EAP?
Request, Response, Success, and Failure
In wireless networks, APs can be divided into three categories: fat vs. thin, _____________ vs. ________________, and ________________.
Controller vs. Standalone, and Captive Portal APs
Which protocol maps IP addresses to their domain name?
DNS
WPA Personal
Designed for individuals or small office/home office (SOHO) settings, which typically have 10 or fewer employees
Temporal Key Integrity Protocol (TKIP)
Encryption for WPA.
Which log documents any unsuccessful event?
Event Log
What is an AP that is set up by an attacker that is designed to mimic an authorized AP?
Evil Twin
IP operates at which layer of the OSI Model?
Layer 3
IEEE 802.11ac
Ratified in 2014 and has data rates over 7 Gbps.
Blurred Edges
The introduction of WLANs in enterprises has changed hard edges to this...
Wi-Fi Protected Access (WPA)
The original set of protections from the Wi-Fi Alliance in 2003 designed to protect both present and future wireless devices.
Wi-Fi Protected Access 2 (WPA2)
The second generation of WPA security from the Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs.
True or False. A Local Area Network has a hard edge while a Wireless Local Area Network has a blurred edge.
True
CCMP is the encryption protocol used for...
WPA2
Attacks can be directed against wireless data systems via two primary methods: Bluetooth and ____________________.
Wireless Local Area Network Attack
parked slaves
connected but not actively participating
master
controls all wireless traffic
Wireless Local Area Network (WLAN)
designed to replace or supplement a wired LAN.
Thin APs
do not contain all the management and configuration functions found in Fat APs
CCMP
encryption for WPA2.
Fat APs
have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless devices they serve.
boundary
known as a "hard edge."
AES
likely to be configured when connected to WPA2.
Institute of Electrical and Electronics Engineers (IEEE)
most influential organization for computer networking and wireless communications. Established in 1884.
Rogue AP
probes that monitor the airwaves for traffic
IEEE 802.11
released in 1997. Standard for wireless local area networks (WLANs).
active slaves
send transmissions
WLC
the single device that can be configured to automatically distribute settings to all controller APs.
Media Access Control (MAC) Address Filtering
used by nearly all wireless AP vendors. Permits or blocks device based on MAC address.
Captive Portal APs
uses a standard web browser to provide information. Gives the wireless user the opportunity to agree to a policy or present valid login credentials.
PIN method
utilizes a PIN printed on a sticker of the wireless router or displayed through a software wizard.
Push-button method
utilizes push buttons and the security configuration takes place.