Wireless Security Quiz

Ace your homework & exams now with Quizwiz!

Which of the following answers refers to a diagnostic tool that can be used for measuring wireless signal strength?

wifi analyzer

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

wireless site survey

Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode?

PSK - pre-shared key

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?

WAP power level controls WiFi analyzer

Which Wifi protected access version is used in a large network or business environment that has 802.1x components like a RADIUS server. It is not suitable for the home.

WPA2- Enterprise

which freq band is a common example of channel overlapping in wireless networking

2.4GHz band

Which of the following wireless encryption schemes offers the highest level of protection?

WPA3

Which of the following allows multiple authentication methods to permit users access to the Local Area Network (LAN) or Wireless LAN (WLAN)?

802.1x 802.1x, which is the Port-based Network Access Control framework, establishes several ways for devices and users to be securely authenticated before they are permitted full network access. Extensible authentication protocol (EAP) is the actual authentication mechanism.

a symmetric 128, 192, or 256-bit block cipher. Wi-Fi Protected Access 2 (WPA2) uses AES to provide higher security encryption for wireless network access than WPA.

AES

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

AES -advanced encryption standard

Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?

AES-CCMP

For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of:

AES-GCMP AES-CCMP

What is a standard encryption algorithm compatible with WPA2.

Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP)

refers to a security solution that allows administrators to block network access for users until they perform required action?

Captive portal

describe channel spacing;

Channels have ~5 MHz spacing, but Wi-Fi requires 20 MHz of channel space. Providing adequate spacing ensures maximum network bandwidth and minimum interference.

an authentication framework frequently used in wireless networks and point-to-point connections. Provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms that can be used with it. Wireless networks take advantage of several methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.

EAP- Extensible Authentication Protocol

Which of the following EAP methods offers the highest level of security and relies on client-side and server-side certificates for authentication??

EAP-TLS

Institute of Electrical and Electronics Engineers (IEEE) 802.1x includes which of the following wireless security standards?

EAPoW WPA3-Enterprise

What kind of access points provide a risk for Wi-Fi users?

Open access point Rogue access point

What are the characteristic features of WPA2/WPA3 Enterprise mode?

Suitable for large corporate networks IEEE 802.1X Requires RADIUS authentication server

Which Wifi Protected access version uses the RC4 stream cipher but adds Temporal Key Integrity Protocol (TKIP) to make it stronger. It is an improved encryption scheme for protecting Wi-Fi communications, designed to replace Wired Equivalent Privacy (WEP).

WPA (first version of Wifi protected access

Which of the following would be the best solution for securing a small network that lacks an authentication server?

WPA3-SAE

What tool or resource can a network administrator use to find rogue hardware wireless access points (WAPs)?

Wifi analyzer a software tool that can scan for wireless signals in the area. With a wireless device, like a smartphone, the surveyor can move to catch rogue access point signals in range.

A user at an office usually connects to the company's Wi-Fi, but it is currently out of service. The user connects to the building's free wireless access point and enters a personal password at the prompt, but is still unable to connect. Analyze the scenario and determine the reason the user is unable to connect.

must use a pre-shared key (password needed to gain access to a WAP. An example is a WPA2 enabled PSK. Using a personal password will not work.)

A network administrator placed three wireless access points (WAPs) on a single floor in a high-rise building. The floor has approximately 20 rooms with some offices separated by walls. What are some appropriate strategies to ensure all users have secure, uninterrupted access to the wireless network?

separate channels by 20Mhz Configure WPA3-Enterprise security.

A user purchased a home wireless router. The user was not able to connect a laptop to the wireless router by pressing the Wi-Fi Protected Setup button. What can the user do to establish a proper connection with the wireless router?

use compatible NIC: Wi-Fi protected access (WPS) works with applicable devices that compatible. WPS is dependent on the type of wireless interface card (NIC) on the printer or laptop. Enter PIN manually: Use can connect to the wireless router without WPS using a passphrase or PIN that is printed on the router device. User selects the wireless router in the laptop's desktop, and enters the passphrase or PIN when prompted.

Enterprise wireless solutions should use which of the following when configuring wireless access points?

Controllers: Enterprise wireless solutions implement wireless controllers for centralized management and monitoring. A controller can be a hardware appliance or a software application run on a server. RADIUS: provides authentication, authorization, and accounting services for wireless clients. Users can use their personal accounts to gain wireless network access.

Which wireless antenna type is used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments and provides a 360-degree horizontal signal coverage?

omnidirectional antenna

You want to deploy a wireless network where only clients with domain-issued digital certificates can join the network. What type of authentication mechanism is the best choice because it requires that both server and client be installed with valid certificates.

EAP-TLS

Which authentication protocol requires both a server and client-side public certificate?

EAP-TLS Extensible Authentication Protocol with Transport Layer Security (EAP-TLS) requires a server and client-side public key certificate. An encrypted TLS tunnel is established between the supplicant and authentication server using this method.

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless access point with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat?

Evil Twin

What is the most widely supported protected tunnel authentication protocol using both supplicant and server certificates.

Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)

benefits of using Wi-Fi heat maps for wireless networks?

Find location of strong signals. Survey a site for signal strength and channel usage throughout an area Determine which channels overlap. Determine where to place access points.

An administrator needs to adjust the placement of multiple Access Points (APs) to ensure the best wireless signal coverage for the network. Which of the following would be of help while identifying areas of low signal strength?

Heat map

What refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

IEEE 802.1X

Which authentication protocol uses a server-side certificate to establish a protected tunnel but requires user authentication methods to use Microsoft Challenge-Handshake Authentication Protocol version 2 (MS-CHAPv2) or Generic Token Card (GTC)?

PEAP Protected Extensible Authentication Protocol (PEAP) creates an encrypted tunnel but only requires a server-side certificate. In this case, the user authentication method must use Microsoft Challenge-Handshake Authentication Protocol version 2 (MS-CHAPv2) or Generic Token Card (GTC).

Which of the following settings provide the highest possible level of security compatible with Wi-Fi Protected Access version 2 (WPA2) at home?

Pre-shared key: a common security setting for consumer wireless routers that allow users to enter a password to access the wireless network. This can be changed to a more complex key or password. AES-CCMP: Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) is a standard encryption algorithm compatible with WPA2.

What is a suitable authentication method for enterprise networks?

RADIUS authentication

a public key cryptography that is widely deployed as a solution for creating digital signatures and key exchange. It can also be used to encrypt only short messages.

Rivest-Shamir-Adleman (RSA)

Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode?

SAE - simultaneous authentication of equals

a secure password-based authentication and key agreement method used in Wireless Protected Access version 3 (WPAv3).

Simultaneous Authentication of Equals (SAE)

a common security setting for consumer wireless routers that allow users to enter a password to access the wireless network. This can be changed to a more complex key or password.

pre-shared key

Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

WEP

Which Wifi Protected Access version uses the AES cipher with 128-bit keys, deployed within the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP).

WPA2

a type of group authentication used when the infrastructure for authenticating securely (via RADIUS, for instance) is not available. The system depends on the strength of the passphrase used for the key

pre-shared key

Evaluate the differences and determine what makes Wi-Fi Protected Access version 3 (WPA3) more secure than WPA2.

WPA3 uses Simultaneous Authentication of Equals (SAE): replaces the 4-way handshake protocol with a protocol based on Diffie-Hellman key agreement. WPA3 uses Galois Counter Mode Protocol (GCMP): uses an updated cryptographical protocol called Advanced Encryption Standard (AES) Galois Counter Mode Protocol (GCMP) mode of operation. Enterprise authentication methods must use 192-bit AES.

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is known as: hint: is deprecated and should not be used due to their known vulnerabilities

WPS

2 wireless technologies that are most deprecated and should not be used due to their known vulnerabilities?

WPS WEP

In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

channel overlapping

What are the non-overlapping channels used to set up a wireless network that allows multiple networks to coexist in the same area without causing interference.

channels 1, 6, and 11

Company A wants to share Wi-Fi access with a subsidiary, company B, located in the same building. Extensible Authentication Protocol (EAP) is implemented at both companies using Remote Authentication Dial-in User Service (RADIUS) servers. How can both networks be configured to allow users from either company to use their company credentials to gain access?

create a RADIUS federation means that multiple organizations allow access to one another's users by joining their RADIUS servers into a RADIUS hierarchy or mesh.


Related study sets

Chapter 39: Oxygenation and Perfusion PREPU

View Set

A&P II: THE DIGESTIVE SYSTEM PART B HOMEWORK

View Set