Chapter 15: Wireless Networking 433
Chapter 15: Wireless Networking
- B. WEP is intended to offer security comparable to that experienced on traditional wired
networks. In practice the security has been less than intended. - A. 802.11a operates exclusively at the 5 GHz frequency range whereas 802.11b and 802.11g
operate at the 2.54 GHz range. The newer 802.11n standard can operate at both frequency
ranges. - D. 802.11i specifies security standards for wireless and is not concerned with specifying
new network standards for communication. WPA and WPA2 are designed to be compatible
with this standard. - D. WEP is by far the weakest of the protocols here; WPA is the next stronger, and WPA2 is
the strongest of the group. Open implies little or no protection at all. - A. The purpose of site surveys is to map out a site and locate access points and other
wireless-enabled devices. - D. When two clients attach to each another in a wireless setting, it is known as an ad hoc
network. - A. An infrastructure network is where the clients attach directly to an access point instead
of another client. - B. A denial of service (DoS) is used to overwhelm an NIDS, tying up its resources so it
cannot perform reliable analysis of traffic and thus allowing malicious packets to proceed
unabated. - A. Signature files are used by IDS systems to match traffic against known attacks to deter-
mine if an attack has been found or if normal traffic is present. - C. Honeyspots are intended to attract victims to attach to it with the intention of gathering
information. - A. SSIDs serve many functions, but the primary goal is to identify the network to clients
or potential clients. SSIDs are configurable by the owner of the network and should be
changed from their defaults in every case. - A. AirPcap is a device designed to allow for in-depth analysis of traffic on wireless net-
works. The device is typically used with software such as Wireshark. - A. A rogue access point is one not managed by the organization and may be set up by an
attacker or may even be set up by an employee trying to circumvent the rules. - C. Bluejacking is a means of sending unsolicited messages to a Bluetooth-enabled device.
- A. Wardriving is used to locate wireless networks when using a mobile device as you
are traveling around a city or neighborhood. Typically a GPS is also included to pinpoint
networks.
bapp01.indd 433 22-07-2014 10:56:37