Fundamental Network Security - A Comprehensive Study Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/232

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

233 Terms

1
New cards

What are the most common wireless technologies? 

Cellular, bluetooth, near field communication, radio frequency identification, and wireless local area networks. 

2
New cards

What are the most widespread wireless networks?

Cellular networks

3
New cards

How are cellular networks operated?

Operated by telecommunication service providers and include consumer wireless cellular carriers.

4
New cards

What is a fixed wireless service?

The device that receives the wireless signal is stationary, and the user can roam freely and remain connected to the fixed device.

5
New cards

Who is responsible for configuring cellular networks?

The telecommunication providers. They own, maintain, and manage their own network equipment and facilities.

6
New cards

What is Bluetooth?

A technology that uses short-range radio frequency (RF) transmissions and provide rapid device pairings. 

7
New cards

What type of network technology is Bluetooth?

Personal area network (PAN)

8
New cards

Bluetooth is a PAN technology designed for what?

Data communication over short distances, enabling users to connect wirelessly to a wide range of computing & telecommunication devices. 

9
New cards

What is the current version of Bluetooth that was introduced in early 2023? 

Bluetooth 5.4

10
New cards

Explain what Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR), or Bluetooth Classic, is designed for.

It is for devices needing short-range continuous connectivity. 

11
New cards

Explain what Bluetooth Low Energy (LE) is for.

For devices that require short bursts of data over long distances.

12
New cards

How many bits per second (bps) can Bluetooth BR/EDR transmit?

1 Mbps to 3 Mbps

13
New cards

How many bits per second (bps) can Bluetooth LE transmit?

125 Kbps to 2 Mbps

14
New cards

What are Bluetooth "classes” for?

They categorize Bluetooth devices. Each class transmits over different distances.

15
New cards

What are the advertised distance ranges for Class 1, Class 2, and Class 3 Bluetooth devices?

Class 1. Up to 328 ft

Class 2. Up to 98 ft

Class 3. Up to 22 ft

16
New cards

What is the primary type of Bluetooth network?

Piconet

17
New cards

What is a broadcaster in a piconet?

The device that controls all wireless traffic.

18
New cards

What is the observer in a piconet?

The device that takes commands from the broadcaster.

19
New cards

What are the two types of observer that a broadcaster can control?

Active (sending transmissions) and parked (not actively participating) followers.

20
New cards

T or F: Bluetooth is usually point-to-point or point-to-multipoint. 

True

21
New cards

What is a Mesh topology do in Bluetooth LE?

They are used to extend the range of a Bluetooth network. An observer can communicate with another broadcaster closer to the broadcaster, who can send it to another broadcaster and so on. 

22
New cards

What ability of Bluetooth opens the door for attacks on Bluetooth?

Its ability for observers to connect to a broadcaster dynamically and automatically.

23
New cards

What is Bluejacking?

An attack that sends unsolicited messages to Bluetooth-enabled devices. More annoying than harmful. 

24
New cards

What is Bluesnarfing? 

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection. Usually done without owner’s permission or knowledge. 

25
New cards

How can we mitigate Bluejacking and Bluesnarfing?

Turn off Bluetooth, making the device nondiscoverable and rejecting pairing unknown requests. 

26
New cards

What is Near Field Communication?

A set of standards used to establish communication between devices in close proximity. It establishes a two-way communication. 

27
New cards

What are the two types of NFC devices?

Passive and Active

28
New cards

What can a Passive NFC device do?

Contains information other devices can read, but it cannot read other tags or receive information.

29
New cards

What can an Active NFC device do?

Can read info and transmit data.

30
New cards

How do NFC devices communicate?

Through magnetic induction; The interrogator and tag each create a high frequency magnetic field from an internal antenna forming a connection.

31
New cards

What does a tag do when it receives instructions from the interrogator?

It checks to determine if they’re valid, if not it ignore the communication.

32
New cards

What are consumer NFC devices used as?

Theya re used as an alternative to paying cash or credit card in a retail store.

33
New cards

What are the four risks against NFC? 

Eavesdropping, data theft, MITM, and device theft. 

34
New cards

What is Radio Frequency Identification used for?

Used to transmit information that can be detected by a proximity reader. Ex. ID Badge with RFID tag inside that can be read by an RFID reader. 

35
New cards

T or F: Most RFID tags are active and have their own power supply.

False. They are passive and have no power supply.

36
New cards

How do RFID tags provide a response?

They are powered by the electrical current induced in the antenna by the incoming signal form the transceiver.

37
New cards

What kind of data do RFID transmit?

ID numbers.

38
New cards

What must active RFID tags have?

Their own power source.

39
New cards

What are four RFID attacks in retail stores?

Unauthorized tag access, fake tags, eavesdropping, and RFID cloning.

40
New cards

T or F: RFID technology can be embedded in a chip.

True

41
New cards

Where is RDIF technology found? 

Enhanced Drivers Licenses, Passports, and Hotel key cards.

42
New cards

Why is not RFID eavesdropping not considered a high risk?

Because of their short range. It makes it hard for an attacker to just walk next to the target and steal information. 

43
New cards

What are WLANs also commonly called? 

Wi-Fi 

44
New cards

What are WLANs designed for?

Replace or supplement a wired local area network

45
New cards

What influential organization is known in computer networking and wireless communications? 

The Institute of Electrical and Electronics Engineers (IEEE).

46
New cards

What is the standard for WLANs operating at 1 and 2 Mbps?

IEEE 802.11

47
New cards

What IEEE amendment added higher speeds to the 802.11 standard?

IEEE 802.11b, it added speeds 5.5 Mbps and 11 Mbps.

48
New cards

What were the drives forces for creating new Wi-fi versions?

New wireless technology being continually developed and incorporated into the new versions, government organizations controlling the usage of the electromagnetic spectrum, and the ongoing need for increased security to prevent eavesdropping and manipulating wireless signals. 

49
New cards

Why would an endpoint need a wireless client network interface card?

To send and receive wireless signals from an embedded antenna in the card.

50
New cards

What is a Wireless Access Point?

It is a centrally located WLAN connection device that can send and receive information. 

51
New cards

What does a Wireless AP consist of?

An antenna, a radio transmitter/receiver, and bridging software to interface wireless devices to other devices, and a wired network interface for connecting to a wired network. 

52
New cards

A WLAN using an AP is operating in what mode?

Infrastructure mode

53
New cards

What are the two basic AP functions?

Acting as a base station for the wireless network and to act as a bridge between the wireless and wired network.

54
New cards

What does a wireless router combine and what are they also called?

Includes features of an AP, firewall, router and DHCP server, along with others. They are also called residential WLAN gateways. 

55
New cards

What are Standard/Fat APs

Independent form other network devices. They have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless devices they serve.

56
New cards

What is the downside of Fat APs?

They each require individual reconfiguration if a network configuration were to change. 

57
New cards

When would we choose a Thin AP over a Fat AP?

When there are multiple APs widely deployed.

58
New cards

What is a Thin AP?

It is a lightweight AP that doesn’t contain all the management and configuration functions that fat APs do.

59
New cards

Where is the configuration for a Thin AP?

It is centralized in the wireless switch. It improves security as it manages from a central location. 

60
New cards

What is a Wireless LAN Controller (WLC)?

They manage controller APs. The WLC is a single device that can be configured and distribute the configurations to all controller APs. 

61
New cards

What is the handoff procedure that occurs when wireless client devices moves through a WLAN? 

One stand alone AP transfers authentication information to another. It can be slow, which affects time-dependent communication.

62
New cards

Where is the handoff procedure done with Controller APs?

In the Wireless LAN Controller (WLC)

63
New cards

What are Captive Portal APs?

An AP that uses a web browser to provide information and give users the chance to agree to a policy or present login credentials.

64
New cards

What is a network hard edge?

A single point through which data passes through form an external network to the internal network in a wired network. Another hard edge is the walls of the building. 

65
New cards

Why have the WLANs in enterprises changed hard edges to “blurred edges”?

A WLAN contains multiple entry data points. Also RF signals can extend past boundaries of a building. 

66
New cards

What is a rogue AP?

An unauthorized AP that allows an attacker to bypass many network security configurations and open the network and its users to attacks. Attackers enter the rogue AP which is behind the firewall. 

67
New cards

What is a Evil Twin AP?

It is designed to mimic an authorized AP. Attackers can capture transmissions from users to the evil twin AP. 

68
New cards

What is one of the most common wireless attacks? 

Intercepting and reading transmitted data.  

69
New cards

What is Jamming?

Attackers use intentional RF interference to flood the RF spectrum to prevent a device from communicating with the AP. Often requires sophisticated and expensive equipment. 

70
New cards

What is a design weakness of 802.11? 

There is an implicit trust of management frames that are transmitted across the wireless network which include the sender’s source address. 

  • It requires no verification of the source device’s identity

  • An attacker can craft a fake frame that pretends to come from a trusted client

71
New cards

What is a Disassociation attack?

An attacker creates false disassociation management frames appearing to come from another device to disconnect it from the AP.

72
New cards

What is the 802.11 Request to Send/Clear to Send (RTS/CTS) protocol?

A RTS frame is transmitted to an AP that contains a duration field indicating the length of time needed for both the transmission and returning acknowledgment frame. The AP and stations that receive the frame are alerted that the medium will be reserved for a specific period. 

  • Each station stores the info in its net allocation vector (NAV) field 

  • No station can transmit if the NAV contains a value other than 0. 

73
New cards

Why is the RTS/CTS Protocol vulnerable? 

An attacker can send the frame with the duration field set to a high value preventing other devices from transmitting for long periods of time. 

74
New cards

What are four WLAN Consumer Attacks?

Data theft, wireless transmissions read, malware injections, and downloading harmful content. 

75
New cards

What is Wired Equivalent Privacy?

An 802.11 security protocol designed to ensure only authorized parties view transmitted wireless information. It accomplishes this by encrypting the transmissions. 

76
New cards

What does WEP rely on? 

A secret key known by the wireless client and AP. That key must be entered on the AP and all devices before transmission can occur because it needs to encrypt and decrypt packets.

77
New cards

How long must the WEP shared key be (in bits)?

It must be 64 bits in length. Vendors also have an option to use a 128-bit shared secret key for higher security. 

78
New cards

What is the shared WEP key combined with? 

An initialization vector (IV)

79
New cards

What is an initialization vector? 

A 24-bit value that changes each time a packet is encrypted. 

80
New cards

Why are the IV and shared key combined?

To be used as a seed for generating a random number necessary in the encryption process. 

81
New cards

How does data get decrypted with WEP?

  1. The IV and encrypted cipher text are transmitted to the receiving device. 

  2. Upon arrival, the receiving device separates the IV from the encrypted text and combines it with its own shared secret key to decrypt. 

82
New cards

What WEP vulnerability deals with bit numbers?

The IV remains at 24 bits, so it can be easier to break than longer keys.

83
New cards

What cryptography rule does WEP violate?

It creates a detectable pattern as there are only a limited amount of possible IV values.

84
New cards

What is Wi-Fi Protected Setup (WPS)?

It is an optional means of configuring security on WLANs. Designed for user with little knowledge of security to implement security easily and quickly on their WLANs. Support for this model is mandatory for wireless routers.

85
New cards

What are the two common WPS methods?

PINS and the push-button method. 

86
New cards

What are the flaws with WPS PIN method? 

No lockout limit, last PIN char is only a checksum, and wireless router reports validity of the 1st and 2nd halves separately, so attackers can just break the 1st four character PIN and the 2nd three character PIN.

87
New cards

What is the most common type of wireless access media control?

MAC address filtering

88
New cards

What is a MAC address?

A 48-but number that is “burned” into the NIC adapter when manufactured.

89
New cards

Explain MAC address filtering.

A clients device’s MAC can be entered on software running on the AP, which is then used to permit or deny the device from connecting to the network.

90
New cards

What MAC vulnerability involves exchanging the MAC address between devices?

While it is being exchanged, it is in unencrypted format. It can be seen by an attacker monitoring the air waves and then substituted it on their device. . 

91
New cards

What MAC address filtering challenge involves managing several MAC addresses? 

It can be difficult and demands constant attention as users join and leave. Not very practical for large wireless networks. 

92
New cards

What was Wi-Fi Protected Access (WPA) designed for? 

It was to fit into the existing WEP engine without requiring hardware upgrade or replacements. 

93
New cards

What are the two versions of WPA?

Enterprise and Personal (10 or fewer)

94
New cards

How is authentication accomplished for WPA-Personal?

Using a preshared key. It is a secret value manually entered on the AP and each wireless device. Devices with the key are authenticated by the AP. WPA is still considered not secure. 

95
New cards

What standard was WPA2 based on?

IEEE 802.11i

96
New cards

What two security areas of WLANs does WPA2 address?

Authentication and encryption

97
New cards

What is the cryptographic wireless protocol for WPA2?

CCMP, or Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

98
New cards

What does CCMP do?

It specifies the use of CCM ( a cipher mode algorithm for data privacy) with AES.

99
New cards

The Cipher Block Chaining Message Authentication Code (CBC-MAC) component of CCMP provides what?

Data integrity and authentication

100
New cards

What is CBC-MAC?

A component of CCMP