7 Written questions
6 Multiple choice questions
- - straight out of the box, no security configured at all.
- WAPs are usually configured to broadcast their presence.
- each wireless network node and access point needs the same SSID.
- could choose not to broadcast SSID.
- Also could implement MAC filtering.
- - available in a range of mobile devices.
- operates in both ad-hoc mode and infrastructure mode.
- by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
- only authenticates devices, not users.
- vulnerable to buffer over flow.
- transmission of frames to all machines on the broadcast network.
- - used for router-to-router traffic, and home user to ISP traffic.
- handle error detection.
- allows IP addresses to be negotiated.
- so used in dial up it will set-up the connection with ISP and negotiate an IP address.
- replaced SLIP in many uses.
- - backwards compatible with 802.11b so same WAP can service 802.11g and 802.11b.
- data link layer does not understand IP addresses.
ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
- defined in RFC 826.
- vulnerable to ARP poisening ( adding bogus entries to ARP cache).
6 True/False questions
802.11a → - backwards compatible with 802.11b so same WAP can service 802.11g and 802.11b.
Multicast → - associated with point-to-point networks.
- point to point transmission with one sender and one receiver.
WEP → data link layer protocol described by the 802.11 standard.
- uses RC4 often reuses IV.
- many installations use the same shared key for all users, so each user can read each others traffic.
- vulnerable to a number of known attacks.
Blue bug attack (bluetooth) → Attacker can use AT commands on victims cell to initiate calls, send messages etc.
802.11b → - developed before 802.11a.
- data throughput of up to 11Mbps.
- most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
- networks secured through use of WPA and WEP.
- 2.4 ghz
Blue jacking (bluetooth) → Attacker can use AT commands on victims cell to initiate calls, send messages etc.