How do wireless IDSs get their data?

How do wireless IDSs get their data? Answer: In centralized wireless intrusion detection system, each access point becomes a wireless IDS agent,...

What is the purpose of a wireless IDS?

What is the purpose of a wireless IDS? Answer: It is to collect data from wireless access points that can be used to detect attacks...

How are PSK/personal keys generated?

How are PSK/personal keys generated? Answer: The administrator types a passphrase into every client and into the access point...

Compare WPA and 802.11i security.

Compare WPA and 802.11i security. Answer: WPA uses the relatively weak RC4 cipher in encryption for confidentiality and uses the only moderately...

What prompted the Wi-Fi Alliance to create WPA?

What prompted the Wi-Fi Alliance to create WPA? Answer: The inadequacy of WEP (which can be cracked in minutes) caused many companies to freeze...

How long may WEP take to crack today?

How long may WEP take to crack today? Answer: If a company encrypts a large enough volume of traffic with the same secret key, the attacker can...

Why are permanent shared keys undesirable?

Why are permanent shared keys undesirable? Answer: Permanent shared keys are undesirable because in large firms that have many access points...

Is 802.11i security strong? Explain.

Is 802.11i security strong? Explain. Answer: 802.11i security is very strong. 802.11i not only provides authentication, but it supplies all of...

How would a wireless DoS attack be carried out?

How would a wireless DoS attack be carried out? Answer: Wireless DoS attacks can be carried out by 1) flooding the frequency being used, 2) flooding...

Physically, what is an evil twin access point?

Physically, what is an evil twin access point? Answer: An evil twin access point is simply a PC that has software to allow it to masquerade as...

Who would set up a rogue access point? Why?

Who would set up a rogue access point? Why? Answer: Rogue access points are unauthorized access points set up by individuals or departments with...

What is the typical range of a WLAN?

What is the typical range of a WLAN? Answer: Wireless 802.11 networks typically have a range of 30 to 100 meters extending in all directions...

In what sense is EAP extensible?

In what sense is EAP extensible? EAP is considered extensible because it is easy to add new authentication methods to EAP (such as smart cards, MS-CHAP,...

How does an EAP session start?

How does an EAP session start? Answer: When a switch senses a connection, it sends an EAP Start message to the RADIUS server. This begins the...

Where is the heavy authentication work done?

Where is the heavy authentication work done? The heavy authentication work is done on a central authentication server, rather than on the switch...

Why is 802.1X called Port-Based Access Control?

Why is 802.1X called Port-Based Access Control? 802.1X is called Port-Based Access Control because security is implemented on specific ports of an...

Why is the access threat to wireless LANs more severe? The intruder does not even have to enter the building, as he or she needs to do in wired LANs. In WLANs, attackers can connect to unprotected (or poorly protected) wireless access points and bypass border router security from outside of the physical premises of the company.

Why is the access threat to wireless LANs more severe? The intruder does not even have to enter the building, as he or she needs to do in wired LANs....

What is the main access threat to Ethernet LANs?

What is the main access threat to Ethernet LANs? Traditionally, Ethernet LANs offered no access security. Any intruder who entered a corporate building...

What is a SLAAC attack?

What is a SLAAC attack? A Stateless Address Auto Configuration (SLAAC) attack is an attack on the functionality and confidentiality of a network....

How can ARP poisoning be used as a DoS attack?

How can ARP poisoning be used as a DoS attack? Spoofed ARP replies can be used to stop all traffic on the local network as part of an ARP DoS attack....

Do switches record IP addresses? Why not?

Do switches record IP addresses? Why not? Switches only look at MAC addresses. They cannot identify the incorrect ARP resolution being pushed out...

What is ARP spoofing?

What is ARP spoofing? ARP spoofing uses false ARP replies to map any IP address to any MAC address. Spoofed ARP replies can be broadcast to other...

Why do hosts send ARP requests?

Why do hosts send ARP requests? If a host (gateway) receives a packet addressed to an internal host (10.0.0.1) it sends an ARP request to every host...

Why do hosts use ARP?

Why do hosts use ARP? Address Resolution Protocol (ARP) is used to resolve 32-bit IP addresses (e.g., 55.91.56.21) into 48-bit local MAC addresses...

Why is it limited in effectiveness?

Why is it limited in effectiveness? Rate limiting frustrates both attackers and legitimate users. It helps, but it does not solve the problem...

What is a false opening?

What is a false opening? False opens occur when a SYN segment arrives and the firewall itself sends back a SYN/ACK segment without passing the SYN...

How can the effects of SYN floods be mitigated?

How can the effects of SYN floods be mitigated? The effects of SYN floods can be mitigated by validating the TCP handshake, rate limiting, or even...

What is black holing?

What is black holing? Black holing is when a firm drops all IP packets from an attacker...

What is a Smurf flood?

What is a Smurf flood? A Smurf flood is a variation of a reflected attack that takes advantage of an incorrectly configured network device (router)...

What is a DRDoS attack, and how does it work?

What is a DRDoS attack, and how does it work? Using a botnet in a reflected attack using legitimate services is known as a distributed reflected denial-of-service...

How does a reflected attack work?

How does a reflected attack work? A reflected attack uses responses from legitimate services to flood a victim. The attacker sends spoofed requests...

How does a P2P attack work?

How does a P2P attack work? A peer-to-peer (P2P) redirect attack uses many hosts to overwhelm a victim using normal P2P traffic (Figure 4-7, Step...

What does a handler do?

What does a handler do? Handlers are an additional layer of compromised hosts that are used to manage large groups of bots. Handlers can direct bots...

How does a DDoS attack work?

How does a DDoS attack work? DDoS attacks are the most common form of DoS attack that uses intermediaries to attack the victim. The attacker's identity...

Describe a SYN flood.

Describe a SYN flood. A SYN flood, or half-open TCP attack, happens when the attacker sends a large number of TCP SYN segments to the victim server....

What is backscatter?

What is backscatter? Backscatter occurs when a victim sends responses to the spoofed IP address used by the attacker, and inadvertently floods an...

What are the main goals of DoS attacks?

What are the main goals of DoS attacks? The ultimate goal of a DoS attack is to cause harm. For corporations, this can come in the form of losses...

What is a denial-of-service attack?

What is a denial-of-service attack? A DoS attack attempts to make a server or network unavailable to legitimate users. In terms of the general goals...

What is meant by "death of the perimeter?"

What is meant by "death of the perimeter?" The "death of the perimeter" is a phrase used by network administrators to convey the idea that creating...

IP Security Protocol:

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work...

DES:

DES:  a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in...

Encryption is the process of:

Encryption is the process of:  a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors...

A security hole is a(n):

A security hole is a(n):  a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small...

IP spoofing means to:

IP spoofing means to:  a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are...

With ANI security control, the network manager:

With ANI security control, the network manager:  a. uses the Authorization Notation Investigation protocol to trace only authorized user passwords b....

A sniffer program is a:

A sniffer program is a:  a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or...

Threat of intrusion comes from ____________.

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e....

________ controls discover unwanted events.

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup Answer: a. preventi...