Chapter 12 Wireless Networking

Ace your homework & exams now with Quizwiz!

What is the maximum number of characters that can exist within an SSID name? 10 12 26 32

32

What type of encryption is currently used to secure WPA2?

AES

CSMA/CD is implemented at the data link layer on wireless networks. true or false

false

If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?

RADIUS Server

Characteristics of 802.11ac

1 Gbps, 5 GHz standard

Which encryption protocol below is used in the WPA2 standard? AES-CCMP AES-CTR AES-TKIP AES-SCMP

AES-CCMP

Characteristics of 802.11b

Enhancements to 802.11 to support 5.5 Mbps and 11 Mbps 2.4 GHz (unlicensed radio band at the rivers a maximum data rate of 11 Mbps) Uses a modulation technique called Direct Sequence Spread Spectrum (DSSS) Have the ability to data-rate-shift while moving. introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected. (to optimize performance, it's recommended that you disable the 802.11b-only modes on all your access points)

Which of the following choices is not one of the four types of packets used by EAP? Request Response Success Error

Error

Bluetooth is an example of what type of technology below? Small Area Network Private Area Network Personal Area Network Limited Area Network

Personal Area Network

What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?

WiFi Pineapple

When using AES-CCMP, the AES-256 bit key requires how many rounds? 4 10 13 15

13

Characteristics of 802.11g

54 Mbps (max data rate), 2.4 GHz standard (backward compatible with 802.11b) uses a modulation technique called Orthogonal Frequency Division Multiplexing (OFDM). When 802.11g clients are operating at the 802.11b rates (11 Mbps, 5.5 Mbps, 2 Mbps, and 1 Mbps), they're actually using the same modulation 802.11b uses

Characteristics of 802.11a

54 Mbps, 5 GHz standard, 12 non-overlapping frequency channels Immune to interferences from devices that operate in the 2.4 GHz band (like microwave ovens, cordless phones, and Bluetooth devices) even when being used in the same physical environment as 802.11b users. Have the ability to data-rate-shift while moving. (allow the person operating at 54 Mbps to shift to 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, and 9 Mbps, and finally, still communicate farthest from the AP at 6 Mbps)

Carrier Sense Multiple Access/Collision Detection. (CSMA/CD)

A MAC protocol that allows collisions to occur but has methods for detecting and recovering from them.See also collision and Media Access Control(MAC).

Characteristics of 802.11n

Allows for communication at both the 2.4 GHz and 5 GHz frequencies by using Channel Bonding. Higher throughput improvements using multiple-input, multiple-output (MIMO) antennas (which employs multiple transmitters and receiver antennas to increase data throughput). Can have up to 8 antennas, but most APs use 4. These are sometimes referred to as Smart Antennas, where if you did have 4 of them, 2 would be used for transmitting simultaneously with the other 2 receiving simultaneously. This setup allows for much higher data rates than the others discussed. 40 MHz Channels: which double the speed + 11 Mbps from not wasting side tones (so 54 to 108 + 11 = 119 Mbps) MAC Efficiency: 802.11 protocols require acknowledgment of each and every frame. 802.11 can pass many packets before an acknowledgment is required, which saves you on overhead. This is called block acknowledgment. Multiple-Input, Multiple-Output (MIMO): Several frames are sent by several antennas over several paths and are then recombined by another set of antennas to optimize throughput and multipath resistance. This is called Spatial Multiplexing

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? Bluesnarfing Bluejacking Bluecracking Bluetalking

Bluejacking

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? Bluejacking Bluecracking Bluesnarfing Bluetalking

Bluesnarfing

How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? Gateway access point Captive portal access point Wireless device probe AUP Enforcement access point

Captive portal access point

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the ____. a. Network Link layer b. Data Link layer c. transport layer d. session layer

Data Link layer

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: EAP-MSCHAPv2 EAP-AKA EAP-FAST EAP-SIM

EAP-FAST

overlapping channels (2.4 GHz)

In the United States, only 11 channels are configurable, what channels 1, 6, and 11 being non-overlapping. This allows you to have three access points in the same area without experiencing interference. You must be aware of the channels when installing APs In a large environment so you do not overlap channels. (if you configure one AP with channel one, and then the next AP would be configured in channel 11, the channel farthest from that configured on the first AP)

What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? LEAP TKIP EAP PEAP

LEAP

Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? TKIP LEAP PEAP ICMP

PEAP

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

The IEEE 802.11 standard protocol for WLANs that attempts to prevent multiple wireless devices from transmitting at the same time. Also has an optional implementation called a Request to Send, Clear to Send (RTS/CTS) because of the way that hosts must communicate with the access point (AP). For every packet sent, and RTS/CTS and acknowledgment must be received in the process

Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network?

access point (AP)

Which option below is responsible for the issuing of EAP request packets? supplicant authenticator authentication server proxy

authenticator

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? active twin authorized twin internal replica evil twin

evil twin

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? random sanctioned rogue legitimate

rogue

Goodput

the amount of usable data that crosses a given point in a network over a certain period of time. (It's the actual data throughout)


Related study sets

Which of the following is a difference between communism and socialism as described by the text?

View Set

Chapter 12 Postpartum Physiological Assessments and Nursing Care

View Set

Crime Scene Investigation - Chapter 8 - Note Taking (Documentation)

View Set

A+ Core 1 Exam Practice Questions

View Set

Ch 26 PrepU: Nursing Care of a Family with a High-Risk Newborn

View Set

SaFe Agile Advanced Scrum Master Exam

View Set