Review Questions

advertisement
Chapter 10
Review Questions
1. Each of the following is a reason to monitor a wireless network except
a. predict when an attack may occur
b. identify security threats
c. verify compliance with federal regulations
d. monitor scare wireless bandwidth
2. Managing a WLAN can be accomplished by using either a system specifically
designed for wireless networks or
a. Simple Network Management Protocol (SNMP)
b. File Transfer Protocol (FTP)
c. Wireless Management Protocol (WMP)
d. Wired Equivalent Protocol (WEP)
3. Each of the following is a U.S. federal regulation that wireless monitoring can be
used to verify compliance except
a. Gramm-Leach-Bliley Act (GLBA)
b. Sarbanes-Oxley Act
c. Health Insurance Portability and Accountability Act (HIPAA)
d. Federal Wireless Security Act
4. Each of the following is a WLAN discovery tool to locate a wireless device
except
a. farthest sensor
b. triangulation
c. RF fingerprinting
d. Received signal strength indication
5. The disadvantage of a mobile sniffing audit is
a. sniffing software is hard to locate
b. rogue access points do not send RF signals
c. it is very time consuming
d. only the network administrator can perform the function
6. Only a laptop computer and not a desktop computer can be used as a wireless
probe. True or False?
7. Dedicated probes resemble standard access points. True or False?
8. An SNMP inform request acknowledges the message with an SNMP response.
True or False?
9. An intrusion detection system is identical to a firewall. True or False?
10. A signature detection WIDS is susceptible to attacks if the matching attack
signature is not in the database. True or False?
11. A(n) _____detection WIDS monitors the normal activity of the wireless LAN and
“learns” its normal characteristics to create a baseline. anomaly
12. A(n) _____ is an attack alert that turns out to be false. false positive
13. A(n) _____ attempts to uncover and prevent an attack before it harms the WLAN.
wireless intrusion prevention system (WIPS)
14. A WIPS that uses an existing access point to monitor the RF is known as a(n)
_____ probe. integrated or embedded
15. One of the most important features of a WIPS is its ability to learn about the other
_____ that are in the area and classify them. access points
16. Explain the difference between triangulation and trilateration.
Triangulation measures the angles between three or more nearby APs; where the
measurements intersect this can be used to calculate the location of the device.
Trilateration measures the distance between APs rather than the angles between
them.
17. How does RF fingerprinting work?
RF fingerprinting uses intelligent algorithms to improve precision by accounting for
the environmental effects on the wireless signal itself. A "fingerprint" of the wireless
environment is first calculated by conducting a physical “walk-around” using a
mobile spectrum analysis device. These measurements are later compared to
deviations in the real-time environment to locate the client device.
18. What is a desktop probe?
Instead of using a mobile wireless device as a probe, a desktop probe utilizes a
standard desktop PC instead. A universal serial bus (USB) wireless network
interface card adapter is plugged into the desktop computer and it monitors the RF
frequency in the area for transmissions.
19. Describe an SNMP trap.
This data reported by these monitors can be important to determining the “health”
of a wireless LAN: a spike in a network’s bandwidth or a decrease in the time to
respond to a request are signs that the network is running slow. These events are
known as an SNMP trap. There are different actions that can be taken when an
SNMP trap occurs. Generally an event alarm is issued and the proper personnel
are notified.
20. How can a WLAN management system be used to upgrade access point
firmware?
WLAN management systems provide the functionality of upgrading the firmware of
access points. Firmware upgrade images can be imported and then applied to one
AP, all APs, or groups of access points. Grouping APs allow firmware images to be
separated distributed based on vendor or model. This allows for upgrades to be
performed at night when there is less traffic.
Download