Chapter 5: Protecting Wireless Networks Flashcards Preview

CompTIA Security+ > Chapter 5: Protecting Wireless Networks > Flashcards

Flashcards in Chapter 5: Protecting Wireless Networks Deck (16)
Loading flashcards...
1

802.11x Protocols
(170)

802.11- 1 or 2 Mbps at 2.4 GHz
802.11a- 54 Mbps at 5 GHz
802.11b- 11 Mbps at 2.4 GHz
802.11g- 54 Mbps at 2.4 GHz
802.11i- security updates, particularly to authentication
802.11n- up to 600 Mbps at 5 and 2.4 GHz
*802.11ac- up to 1 Gbps at 5 GHz
*802.11ad- up to 7Gbps at 60 GHz
***The 60 GHz band is also more secure due to a smaller radius of signal propagation

2

Wired Equivalent Privacy (WEP)
(171)

Legacy wireless security that can be cracked in 5 minutes. TKIP was introduced to make it much more secure, but that has long since been broken.

3

Wireless Application Protocol (WAP)
(172)

used for ancient wireless devices. Uses WML for webpage display.
Sometimes the connection between the WAP server and the internet wasn't encrypted, which created security risks.

4

Wi-Fi Protected Access (WPA)
(172)

Created to implement the 802.11i standard. WPA2 takes care of all of it, while WPA only lives up to some of it.
WPA uses TKIP, and WPA2 uses CCMP

5

Wireless Transport Layer Security (WTLS)
173

Security for WAP.
Similar to TLS, but considerably less powerful.

6

Security levels in WAP
174

Anonymous authentication
-Anyone can connect to the web portal
Server Authentication
-You must authenticate against a server
Two-way (client server) authentication
-The server must authenticate with the client must authenticate with the server.

7

Technologies used to communicate between WAP device and server
175

Wireless Session Protocol (WSP)
-Session information and connection
Wireless Transaction Protocol (WTP)
-Similar in function to TCP and UDP
Wireless Datagram Protocol (WDP)
-Common interface between devices

8

Captive Portals
180

When you have to agree to terms and conditions in order to access the internet. An example of this would be at Starbucks.

9

Extensible Authentication Protocol
181

Framework of authentication for wireless networks.
The important ones are LEAP and PEAP.
It's used for WPS, which is terrible.

10

Lightweight EAP
182

LEAP is Cisco proprietary and is being phased out. It requires mutual authentication, but it's susceptible to dictionary attacks.

11

Protected EAP
182

PEAP was developed by Cisco, RSA, and Microsoft. It has native support in Windows (starting with XP), and has replaced all former versions of EAP.

12

Site Survey
185

You listen to a wireless network and you can see information about the network, including what systems are in use and which protocols they're using.

13

War Driving
185

Driving around in search of wireless access points that are either unrestricted or easily hacked.

14

War Chalking
185

Writing on a wall, on the street, on a sign, etc. information about a wireless access point you've jumped on to

15

Blue Jacking
187

Spam over Bluetooth. It's annoying, but mostly harmless.

16

Blue Snarfing
187

Hacking the device running Bluetooth to access files, wreak havoc, or whatever.