Hamner.John.Test 3 Part 1

advertisement
IST 462
Network Security
Test 3
JOHN HAMNER_______________________
After answering the following questions, change the name of your file to
LastName.FirstName.Test3 Part1 and copy your file to the correct folder on
Blackhawk.
Do all your work on your desktop. Do not use a flash drive or any Internet resources.
1.
What was the name of the original IEEE standard for wireless transmissions?
802.11
2.
How do most wireless access points contol access from a remote device?
Through wireless encryption protocol (WEP) keys
3.
What is the purpose of WEP?
To protect data that is transmitted wireless from being picked up by those outside the network
and potentially exploited
4.
Describe the process WEP uses to encrypt data.
WEP converts the data with a cipher into some sort of encrypted mumbo jumbo
5.
What is the SSID and how is it used for authentication?
The SSID is the wireless network name and devices use it to access particular wireless networks.
6.
Why is MAC address filtering considered weak?
Because it is so easy to advertise a false MAC address and gain access to a network
7.
Why is WEP considered to be weak?
WEP keys are fairly short and it is possible to obtain and decrypt the key without having
authorized access to the wireless network
8.
PSK serves two purposes. What are they?
To secure and encrypt data transmitted wireless and resist decryption by outside attackers
9.
Explain the difference between the three terms: identification, authentication, and
authorization.
Identification: username Authentication: password Authorization: user privileges
10.
Of the access control models discussed in class, which one is closest to “group
permissions?”
Role-based
11.
Describe an access control list for a Unix machine.
An access control list for a unix machine is the user names and their groups. Single users can be
assigned permissions as can groups of users. Permissions include read, write, and execute and
can be applied to files and directories
12.
What does the “enforce password history” policy do?
It prevents users from reusing old passwords when prompted to create a new one
13.
What does the “maximum password age” policy do?
Maximum password age sets the amount of time that must pass before a user is allowed to
recycle an old password
14.
If “enforce password history” is set to 12 and “maximum password age” is set to 10, then
how many days must elapse before a user can reuse a previous password?
120 days
15.
Describe how a time-synchronized one-time password with a token works.
The token provides the password to the user based off some sort of algorithm shared with the
authentication server. The password the token creates is viable only for a short period of
time before it expires.
16.
How can the above password system be compromised?
The token can be stolen and used by an attacker or an attacker could attempt to intercept the
password in the brief window that it is available.
17.
Explain how keystroke dynamics might be used to authenticate a user.
Keystroke dynamics attempts to identify a user based on the rhythm and cadence of their typing
18.
Give an example of cognitive biometrics that can be used to authenticate a user.
Cognitive biometrics attempts to identify a user based on what s/he usually does.
19.
What is an advantage of VPN?
A VPN is virtual and private! With a VPN it becomes possible to create virtual LANs over other
types of networks. E.g. Hamachi is a software program that allows users to create VPNs
over the internet. It assigns virtual IP addresses for these machines and they can
communicate as if they are networked
20.
What is an disadvantage of VPN?
There are potential privacy concerns. Hamachi, for example, handles all the VPN traffic through
their own servers, potentially raising privacy concerns for user date
Download