Ch09 - CST Home

advertisement
Chapter 9 RQ Answers
Review Questions
1. After the IEEE 802.11 standard was ratified in 1999 independent studies
identified WEP weaknesses by the year
a. 2001
b. 2003
c. 2004
d. 2005
2. The two primary security vulnerabilities of the original 802.11 wireless security
mechanism are
a. speed and data modeling
b. encryption and authentication
c. access codes and passwords
d. tokens and resources
3. WPA and WPA2 were created by which organization?
a. IEEE
b. CompTIA
c. Wi-Fi Alliance
d. Wireless Research Resource Group (WRRG)
4. After the security flaws in WEP were publicized, the IEEE TGi task group
released a new proposed implementation known as
a. WPA
b. WEP2
c. TKIP
d. Dynamic TKIP
5. _____ is another name for the IEEE 802.11 standard.
a. robust security network (RSN)
b. Wireless Access Protection 2 (WAP2)
c. Encryption Model II
d. Enterprise Standard Security (ESS)
6. Advanced Encryption Standard (AES) is a block cipher. True or False?
7. The IEEE 802.1x standard enforces port security. True or False?
8. Pre-authentication allows a device to become authenticated prior to being turned
on. True or False?
9. Wi-Fi Protected Access (WPA) is a subset of IEEE 802.11i. True or False?
10. MIC performs encryption by using a per-byte key. True or False?
11. The _____replaces the Cyclic Redundancy Check (CRC) function in WEP.
Message integrity check (MIC)
12. Unlike WEP, the _____ is not used for encryption but instead serves as the
starting point (seed) for mathematically generating the encryption keys. Preshared keys (PSK)
13. _____ allows both AES and TKIP clients to operate in the same WLAN, whereas
IEEE 802.11i only recognizes TKIP. WPA2
14. The _____ security model should only be implemented as a temporary solution.
transitional
15. Shared key authentication uses _____ keys for authentication. WEP
16. List the three steps that should be taken for implementing the transitional security
model.
There are three important steps that should be taken for authentication under the
transitional security model. These are using shared key authentication, turning off
SSID beaconing, and implementing MAC address filtering.
17. When should the personal security model be implemented?
A dramatically increased level of security can be achieved through using the
personal security model. The personal security model is designed for single users or
small office home office (SOHO) settings of generally ten or fewer wireless devices.
The personal security model is intended for settings in which an authentication
server is unavailable.
18. Why should AES encryption and decryption be performed in hardware instead of
software?
It is recommended that AES encryption and decryption be performed in hardware
because of the computationally intensive nature of AES. Performing AES
encryption in software requires sufficient processing power. If an access point
performed AES encryption/decryption in software while serving several devices, the
AP would not be able to adequately service the devices, especially if that access point
lacked a powerful processor and a large amount of memory.
19. How does a RADIUS server support IEEE 802.1x?
The authentication server in an 802.1x configuration stores the list of the names and
credentials of authorized users in order to verify their user authenticity. Typically a
Remote Authentication Dial-In User Service (RADIUS) server is used. When a user
wants to connect to the wireless network, the request is first sent to authenticator,
which relays the information, such as the username and password, type of
connection, and other information, to the RADIUS server. The server first
determines if the AP itself is permitted to send requests. If so, the RADIUS server
attempts to find the user’s name in its database. It then applies the password to
decide whether access should be granted to this user. Depending upon the
authentication method being used, the server may return a challenge message that
carries a random number. The authenticator relays the challenge to the user’s
computer, which must respond with the correct value to prove its asserted identity.
Once the RADIUS server is satisfied that the user is authentic and authorized to use
the requested service, it returns an “Accept” message to the AP.
20. What is a virtual private network (VPN)?
A virtual private network (VPN) uses a public, unsecured network as if it were a
private, secured network. VPN transmissions are achieved through communicating
with endpoints. An endpoint is the end of the tunnel between VPN devices. An
endpoint can be software on a local computer, a dedicated hardware device such as
a VPN concentrator (which aggregates hundreds or thousands of connections
together), or even a firewall. VPNs can also be used in a wireless LAN setting.
Because of its vulnerabilities a wireless user can “tunnel” through the less-thansecure wireless network using a VPN and rely on its security advantages. For
example, a user may access a public wireless hotspot at an airport or coffee shot and
use VPN to “tunnel” through it to reach the secure corporate network
Download