Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Assessment Test
1. At which layers of the OSI model does 802.11 technology operate? (Choose all that apply.)
A. Data-Link
B. Network
C. Physical
D. Presentation
E. Transport
2. PSK authentication is mandatory in which of the following? (Choose all that apply.)
A. WPA-Personal
B. WPA Enterprise
C. WPA-2 SOHO
D. WPA-2 Enterprise
E. WPA2-Personal
3. 802.11 pre-RSNA security defines which wireless security solution?
A. Dynamic WEP
B. 802.1X/EAP
C. 128-bit static WEP
D. Temporal Key Integrity Protocol
E. CCMP/AES
4. Which of these legacy security solutions provides Layer 3 data privacy?
A. Open System
B. IPsec VPN
C. PPTP VPN
D. Static WEP with IPsec VPN
5. What type of encryption is shown is this graphic?
A. TKIP/RC4
B. WEP
C. CCMP/AES
D. MPPE
E. Proprietary
6. Which of the following encryption methods use asymmetric communications?
A. WEP
B. TKIP
C. Public-key cryptography
D. CCMP
7. For an 802.1X/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption? (Choose two.)
A. Supplicant
B. Authorizer
C. Authenticator
D. Authentication server
8. Which of these types of EAP do not use tunneled authentication? (Choose all that apply.)
A. EAP-LEAP
B. EAP-PEAPv0 (EAP-MSCHAPv2)
C. EAP-PEAPv1 (EAP-GTC)
D. EAP-FAST
E. EAP-TLS (normal mode)
F. EAP-MD5
9. What type of WLAN security is depicted by this graphic?
A. RSN
B. TSN
C. VPN
D. WPS
E. WMM
10. The 802.11-2007 standard defines authentication and key management (AKM) services. Which of these keys are part of the key hierarchy defined by AKM? (Choose all that apply.)
A. MSK
B. GTK
C. PMK
D. ACK
E. ATK
11. Which of these Wi-Fi Alliance security certifications are intended for use only in a home office environment? (Choose all that apply.)
B. WPA-Enterprise
C. WPA2-Personal
D. WPA2-Enterprise
E. WPS
12. Which of these fast secure roaming (FSR) methods requires an authenticator and supplicant to establish an entire 802.1X/EAP exchange prior to the creation of dynamic encryption keys when a supplicant is roaming?
A. PMK caching
B. Opportunistic key caching
C. Fast BSS transition
D. Preauthentication
13. What is the main WLAN security risk shown in the graphic below?
A. The ad hoc clients are not using encryption.
B. The ad hoc clients are using weak authentication.
C. The ad hoc clients are not communicating through an access point.
D. The ad hoc client #1 Ethernet card is connected to an 802.3 wired network.
14. Which components of 802.11 medium contention can be compromised by a DoS attack? (Choose all that apply.)
A. Physical carrier sense
B. Interframe spacing
C. Virtual carrier sense
D. Random backoff timer
15. After viewing this graphic, determine which type of WLAN attack tool could be used to create this Layer 1 denial of service to the WLAN.
A. All-band hopping jammer
B. Wide-band jammer
C. Narrow-band jammer
D. Queensland software utility
E. Packet generator
16. Bill is designing a WLAN that will use an integrated WIPS with dedicated full-time sensors. The WLAN predictive modeling software solution that Bill is using has recommended a ratio of one dedicated sensor for every six access points. Bill needs to make sure that the entire building can be monitored at all times, and he is also concerned about the accuracy of location tracking of rogue devices. What considerations should Bill give to sensor placement in order to properly meet his objectives? (Choose all that apply.)
A. Installing the sensors in a straight line
B. Installing the sensors in a staggered arrangement
C. Installing sensors around the building perimeter
D. Increasing the transmit power
E. Installing more sensors
17. Which of these WIDS/WIPS software modules allows an organization to monitor WLAN statistics on hidden nodes, excessive Layer 2 retransmissions, excessive wired to wireless traffic, and excessive client roaming? (Choose all that apply.)
A. Spectrum analysis
B. Protocol analysis
C. Forensic analysis
D. Signature analysis
E. Performance analysis
18. Kate has deployed a remote AP at her house. She wants to use the remote AP to send data back the corporate WLAN controller securely using the remote AP VPN capabilities. She also wants to access a local gateway to the Internet through the remote AP. How can Kate configure the remote AP to meet her needs? (Choose all that apply.)
A. Tunnel mode using the corporate SSID
B. Tunnel mode using the corporate SSID and a guest SSID
C. Bridge mode using the corporate SSID
D. Bridge mode using the corporate SSID and a guest SSID
E. Split-tunnel mode using the corporate SSID
F. Split-tunnel mode using the corporate SSID and a guest SSID
19. Identify the protocols that are normally used to manage WLAN infrastructure devices securely. (Choose all that apply.)
A. HTTPS
B. Telnet
C. SSH2
D. TLS
E. IPsec
F. CCMP/AES
20. What type of WLAN security policy defines WLAN security auditing requirements and policy violation report procedures?
A. Functional policy
B. General policy
C. Protocol policy
D. Performance policy
Answers to Assessment Test
1. A, C. The IEEE 802.11-2007 standard only defines communication mechanisms at the Physical layer and MAC sublayer of the Data-Link layer of the OSI model. For more information, see Chapter 1.
2. A, E. The security used in SOHO environments is preshared key (PSK) authentication. The Wi-Fi Alliance WPA-Personal and WPA2-Personal certifications both use the PSK authentication method; however, WPA-Personal specifies TKIP-RC4 encryption and WPA2-Personal specifies AES-CCMP. WLAN vendors have many names for PSK authentication, including WPA/WPA2-Passphrase, WPA/WPA2-PSK, and WPA/WPA2-Preshared Key. For more information, see Chapter 1.
3. C. The original 802.11 standard ratified in 1997 defined the use of a 64-bit or 128-bit static encryption solution called Wired Equivalent Privacy (WEP). WEP is considered pre-RSNA security. Dynamic WEP was never defined under any wireless security standard. The use of 802.1X/EAP, TKIP/RC4, and CCMP/AES are all defined under the current 802.11-2007 standard for robust network security (RSN). For more information, see Chapter 2.
4. D. IPsec and PPTP are considered Layer 3 VPN solutions. Layer 3 VPNs use secure tunneling, which is the process of encapsulating one IP packet within another IP packet. Layer 3 VPNs use Layer 3 encryption; therefore, the payload that is being encrypted is the Layer 4-7 information. The private tunnel IP addresses are encrypted; however, the public IP addresses are still seen in cleartext. WEP uses Layer 2 encryption, which protects Layers 3-7. Many legacy WLAN security solutions used an IPsec VPN combined with WEP encryption. The WEP encryption was used to protect the IPsec VPN's public IP addresses. For more information, see Chapter 2.
5. E. The graphic depicts a packet capture of an 802.11 data frame protected by the proprietary Fortress encryption protocol. In addition to the Layer 2 encryption defined by the 802.11-2007 standard, proprietary Layer 2 encryption solutions such as xSec and Fortress can also be used for WLAN data privacy. For more information, see Chapter 3.
6. C. WEP, TKIP, and CCMP use symmetric algorithms. WEP and TKIP use the RC4 algorithm. CCMP uses the AES cipher. Public-key cryptography is based on asymmetric communications. For more information, see Chapter 3.
7. A, C. An 802.1X/EAP solution requires that both the supplicant and the authentication server support the same...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.