Chapter 8 Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the program that monitors a virtual machine called?

Hypervisor

Evil Twin

An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead.

Controller APs

An AP that is managed through a dedicated wireless LAN controller (WLC).

Protected EAP (PEAP)

An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords. Creates encrypted channel between the client and the authentication server.

Wired Equivalent Privacy (WEP)

An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure. Encrypts plaintext into ciphertext.

Wi-Fi Protected Setup (WPS)

An optional means of configuring security on wireless local area networks.

rogue access point (rogue AP)

An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

rogue access point

An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. Usually set up by an insider (employee).

_________________________ is an attack that sends annoying and unsolicited messages to Bluetooth-enabled device while ____________________ is an attack that accesses information from a wireless device through a Bluetooth connection.

Bluejacking; Bluesnarfing

WPA Enterprise

Intended for larger enterprises, schools, and government agencies

Wi-Fi Protected Access (WPA)

Introduced in 2003 by the Wi-Fi Alliance. Handles both encryption and authentication.

Three types of WLAN attacks are __________________, evil twin, and ___________________.

Rogue Access; Wireless Replay

In addition to WEP and WPS, the vulnerabilities of other IEEE security options were discussed in this LSA including MAC address filtering and __________________.

Service Set Identifier (SSID)

What range can bluetooth go up to?

800ft

Temporal Key Integrity Protocol (TKIP)

A WPA encryption technology.

Extensible Authentication Protocol (EAP)

A framework for transporting authentication protocols that defines the format of the messages.

Service Set Identifier (SSID)

A network name that wireless routers use to identify themselves.

Wireless replay attack

A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker's presence being detected. Also known as "hijacking".

IEEE 802.11n

A proposed standard for faster wireless LANs projected to be ratified in 2009.

Wireless Security Solutions

A unified approach to WLAN security needed; thus, the Wi-Fi Alliance began developing security solutions. Include WPA and WPA2.

Bluetooth

A wireless technology that uses short-range radio frequency transmissions.

Evil twin AP

AP set up by an attacker. Mimics an authorized AP.

access point (AP)

Acts as a bridge between wireless and wired networks. Can connect to wired network by a cable.

What are the four types of packets used by EAP?

Request, Response, Success, and Failure

In wireless networks, APs can be divided into three categories: fat vs. thin, _____________ vs. ________________, and ________________.

Controller vs. Standalone, and Captive Portal APs

Which protocol maps IP addresses to their domain name?

DNS

WPA Personal

Designed for individuals or small office/home office (SOHO) settings, which typically have 10 or fewer employees

Temporal Key Integrity Protocol (TKIP)

Encryption for WPA.

Which log documents any unsuccessful event?

Event Log

What is an AP that is set up by an attacker that is designed to mimic an authorized AP?

Evil Twin

IP operates at which layer of the OSI Model?

Layer 3

IEEE 802.11ac

Ratified in 2014 and has data rates over 7 Gbps.

Blurred Edges

The introduction of WLANs in enterprises has changed hard edges to this...

Wi-Fi Protected Access (WPA)

The original set of protections from the Wi-Fi Alliance in 2003 designed to protect both present and future wireless devices.

Wi-Fi Protected Access 2 (WPA2)

The second generation of WPA security from the Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs.

True or False. A Local Area Network has a hard edge while a Wireless Local Area Network has a blurred edge.

True

CCMP is the encryption protocol used for...

WPA2

Attacks can be directed against wireless data systems via two primary methods: Bluetooth and ____________________.

Wireless Local Area Network Attack

parked slaves

connected but not actively participating

master

controls all wireless traffic

Wireless Local Area Network (WLAN)

designed to replace or supplement a wired LAN.

Thin APs

do not contain all the management and configuration functions found in Fat APs

CCMP

encryption for WPA2.

Fat APs

have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless devices they serve.

boundary

known as a "hard edge."

AES

likely to be configured when connected to WPA2.

Institute of Electrical and Electronics Engineers (IEEE)

most influential organization for computer networking and wireless communications. Established in 1884.

Rogue AP

probes that monitor the airwaves for traffic

IEEE 802.11

released in 1997. Standard for wireless local area networks (WLANs).

active slaves

send transmissions

WLC

the single device that can be configured to automatically distribute settings to all controller APs.

Media Access Control (MAC) Address Filtering

used by nearly all wireless AP vendors. Permits or blocks device based on MAC address.

Captive Portal APs

uses a standard web browser to provide information. Gives the wireless user the opportunity to agree to a policy or present valid login credentials.

PIN method

utilizes a PIN printed on a sticker of the wireless router or displayed through a software wizard.

Push-button method

utilizes push buttons and the security configuration takes place.


Set pelajaran terkait

Group Dynamics -- Notes from presentations

View Set

Isolationism and Interventionism

View Set

Unit 3 Test STA 2023 McGraw Hill

View Set

Med Bac exam 3 Quizzes and exercises

View Set

Quiz# 3 Ch: 13 Motivation, Teaching and Learning

View Set