Exam 8: Wireless Network Security
Describe how wireless VLANs can be configured.
Wireless VLANs can be configured in one of two ways. The difference depends on which device separates the packets and directs them to different networks. In one configuration, separating packets in this wireless VLAN is done by the switch. Each AP is connected to a separate port on the switch and represents a different VLAN. As packets destined for the wireless LAN arrive at the switch, the switch separates the packets and sends them to the appropriate AP (VLAN). A more flexible approach is to have the AP responsible for separating the packets. The key to this configuration is that different VLANs are transmitted by the AP on different SSIDs. This enables only the clients associated with a specific VLAN to receive those packets. Access points that support wireless VLANs may support 16 or more multiple SSIDs (and thus multiple VLANs).
The SSID can generally be any alphanumeric string from 2 to ___ characters.
C
When a wireless device looks for beacon frames it is known as ____________________.
scanning
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Discuss the different types of interference one might encounter using wireless devices.
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
____ is designed to detect any changes in a packet, whether accidental or intentional.
When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.
Explain why it is important to be able to control the power level at which the WLAN transmits.
A group of piconets in which connections exist between different piconets is called a ____.
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)