7 Written questions
6 Multiple choice questions
- - based on EAP framework; negotiate authentication method at startup.
- 802.1X standard.
- uses AES
- - associated with point-to-point networks.
- point to point transmission with one sender and one receiver.
- - developed before 802.11a.
- data throughput of up to 11Mbps.
- most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
- networks secured through use of WPA and WEP.
- 2.4 ghz
- allows an anonymous message to be displayed on victims device.
- - operates in different frequency range - 5 GHZ.
- less prone to interference.
- greater speeds.
- not as widely used.
- - straight out of the box, no security configured at all.
- WAPs are usually configured to broadcast their presence.
- each wireless network node and access point needs the same SSID.
- could choose not to broadcast SSID.
- Also could implement MAC filtering.
6 True/False questions
WEP → data link layer does not understand IP addresses.
ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
- defined in RFC 826.
- vulnerable to ARP poisening ( adding bogus entries to ARP cache).
Circuit switching → - needs to establish an end to end path before transmission.
- analogue networks.
switches → - Similar to bridge in that it routes frames.
- most commonly used to connect individual computers.
Multicast → transmission of frames to a subset of the machines on the broadcast network.
ARP → data link layer protocol described by the 802.11 standard.
- uses RC4 often reuses IV.
- many installations use the same shared key for all users, so each user can read each others traffic.
- vulnerable to a number of known attacks.
bridges → transmission of frames to all machines on the broadcast network.