CWSP Certified Wireless Security Professional Official Study Guide (eBook)

Exam PW0-204
eBook Download: EPUB
2011 | 1. Auflage
696 Seiten
Sybex (Verlag)
978-0-470-61964-3 (ISBN)

Lese- und Medienproben

CWSP Certified Wireless Security Professional Official Study Guide -  David D. Coleman,  David A. Westcott,  Bryan E. Harkins,  Shawn M. Jackman
Systemvoraussetzungen
47,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

David D. Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLAN security consultant and technical trainer with over twenty years of IT experience. The company he founded, AirSpy Networks (www.airspy.com), specializes in corporate WLAN training.

David A. Westcott, CWNE #7, CWNA, CWSP, CWNT, is an independent consultant and WLAN technical trainer with over twenty years ofexperience. He has been a certified trainer for over fifteen years.

Bryan E. Harkins, CWNE #44, CWSP,CWNA, CWNT, is the Training and Development Manager for Motorola AirDefense Solutions, a market leader in wireless intrusion prevention systems.

Shawn M. Jackman, CWNE #54, CWNA, CWSP, CWAP is a principal WLAN engineer with Kaiser Permanente. He has over fifteen years' experience working with wireless manufacturers and integrators.

David D. Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLANsecurity consultant and technical trainer with over twenty years ofIT experience. The company he founded, AirSpy Networks(www.airspy.com), specializes in corporate WLAN training. David A. Westcott, CWNE #7, CWNA, CWSP, CWNT, is anindependent consultant and WLAN technical trainer with over twentyyears ofexperience. He has been a certified trainer for overfifteen years. Bryan E. Harkins, CWNE #44, CWSP,CWNA, CWNT, is theTraining and Development Manager for Motorola AirDefense Solutions,a market leader in wireless intrusion prevention systems. Shawn M. Jackman, CWNE #54, CWNA, CWSP, CWAP is aprincipal WLAN engineer with Kaiser Permanente. He has over fifteenyears' experience working with wireless manufacturers andintegrators.

Introduction xxvii
Assessment Test xlii
Chapter 1 WLAN Security Overview 1
Chapter 2 Legacy 802.11 Security 31
Chapter 3 Encryption Ciphers and Methods 65
Chapter 4 Enterprise 802.11 Layer 2 Authentication Methods 101
Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 173
Chapter 6 SOHO 802.11 Security 221
Chapter 7 802.11 Fast Secure Roaming 249
Chapter 8 Wireless Security Risks 291
Chapter 9 Wireless LAN Security Auditing 337
Chapter 10 Wireless Security Monitoring 369
Chapter 11 VPNs, Remote Access, and Guest Access Services 429
Chapter 12 WLAN Security Infrastructure 455
Chapter 13 Wireless Security Policies 509
Appendix A Abbreviations, Acronyms, and Regulations 553
Appendix B WLAN Vendors 575
Appendix C About the Companion CD 579
Glossary 583
Index 623

Assessment Test

1. At which layers of the OSI model does 802.11 technology operate? (Choose all that apply.)

A. Data-Link

B. Network

C. Physical

D. Presentation

E. Transport

2. PSK authentication is mandatory in which of the following? (Choose all that apply.)

A. WPA-Personal

B. WPA Enterprise

C. WPA-2 SOHO

D. WPA-2 Enterprise

E. WPA2-Personal

3. 802.11 pre-RSNA security defines which wireless security solution?

A. Dynamic WEP

B. 802.1X/EAP

C. 128-bit static WEP

D. Temporal Key Integrity Protocol

E. CCMP/AES

4. Which of these legacy security solutions provides Layer 3 data privacy?

A. Open System

B. IPsec VPN

C. PPTP VPN

D. Static WEP with IPsec VPN

5. What type of encryption is shown is this graphic?

A. TKIP/RC4

B. WEP

C. CCMP/AES

D. MPPE

E. Proprietary

6. Which of the following encryption methods use asymmetric communications?

A. WEP

B. TKIP

C. Public-key cryptography

D. CCMP

7. For an 802.1X/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption? (Choose two.)

A. Supplicant

B. Authorizer

C. Authenticator

D. Authentication server

8. Which of these types of EAP do not use tunneled authentication? (Choose all that apply.)

A. EAP-LEAP

B. EAP-PEAPv0 (EAP-MSCHAPv2)

C. EAP-PEAPv1 (EAP-GTC)

D. EAP-FAST

E. EAP-TLS (normal mode)

F. EAP-MD5

9. What type of WLAN security is depicted by this graphic?

A. RSN

B. TSN

C. VPN

D. WPS

E. WMM

10. The 802.11-2007 standard defines authentication and key management (AKM) services. Which of these keys are part of the key hierarchy defined by AKM? (Choose all that apply.)

A. MSK

B. GTK

C. PMK

D. ACK

E. ATK

11. Which of these Wi-Fi Alliance security certifications are intended for use only in a home office environment? (Choose all that apply.)

A. WPA-Personal

B. WPA-Enterprise

C. WPA2-Personal

D. WPA2-Enterprise

E. WPS

12. Which of these fast secure roaming (FSR) methods requires an authenticator and supplicant to establish an entire 802.1X/EAP exchange prior to the creation of dynamic encryption keys when a supplicant is roaming?

A. PMK caching

B. Opportunistic key caching

C. Fast BSS transition

D. Preauthentication

13. What is the main WLAN security risk shown in the graphic below?

A. The ad hoc clients are not using encryption.

B. The ad hoc clients are using weak authentication.

C. The ad hoc clients are not communicating through an access point.

D. The ad hoc client #1 Ethernet card is connected to an 802.3 wired network.

14. Which components of 802.11 medium contention can be compromised by a DoS attack? (Choose all that apply.)

A. Physical carrier sense

B. Interframe spacing

C. Virtual carrier sense

D. Random backoff timer

15. After viewing this graphic, determine which type of WLAN attack tool could be used to create this Layer 1 denial of service to the WLAN.

A. All-band hopping jammer

B. Wide-band jammer

C. Narrow-band jammer

D. Queensland software utility

E. Packet generator

16. Bill is designing a WLAN that will use an integrated WIPS with dedicated full-time sensors. The WLAN predictive modeling software solution that Bill is using has recommended a ratio of one dedicated sensor for every six access points. Bill needs to make sure that the entire building can be monitored at all times, and he is also concerned about the accuracy of location tracking of rogue devices. What considerations should Bill give to sensor placement in order to properly meet his objectives? (Choose all that apply.)

A. Installing the sensors in a straight line

B. Installing the sensors in a staggered arrangement

C. Installing sensors around the building perimeter

D. Increasing the transmit power

E. Installing more sensors

17. Which of these WIDS/WIPS software modules allows an organization to monitor WLAN statistics on hidden nodes, excessive Layer 2 retransmissions, excessive wired to wireless traffic, and excessive client roaming? (Choose all that apply.)

A. Spectrum analysis

B. Protocol analysis

C. Forensic analysis

D. Signature analysis

E. Performance analysis

18. Kate has deployed a remote AP at her house. She wants to use the remote AP to send data back the corporate WLAN controller securely using the remote AP VPN capabilities. She also wants to access a local gateway to the Internet through the remote AP. How can Kate configure the remote AP to meet her needs? (Choose all that apply.)

A. Tunnel mode using the corporate SSID

B. Tunnel mode using the corporate SSID and a guest SSID

C. Bridge mode using the corporate SSID

D. Bridge mode using the corporate SSID and a guest SSID

E. Split-tunnel mode using the corporate SSID

F. Split-tunnel mode using the corporate SSID and a guest SSID

19. Identify the protocols that are normally used to manage WLAN infrastructure devices securely. (Choose all that apply.)

A. HTTPS

B. Telnet

C. SSH2

D. TLS

E. IPsec

F. CCMP/AES

20. What type of WLAN security policy defines WLAN security auditing requirements and policy violation report procedures?

A. Functional policy

B. General policy

C. Protocol policy

D. Performance policy

Answers to Assessment Test

1. A, C. The IEEE 802.11-2007 standard only defines communication mechanisms at the Physical layer and MAC sublayer of the Data-Link layer of the OSI model. For more information, see Chapter 1.

2. A, E. The security used in SOHO environments is preshared key (PSK) authentication. The Wi-Fi Alliance WPA-Personal and WPA2-Personal certifications both use the PSK authentication method; however, WPA-Personal specifies TKIP-RC4 encryption and WPA2-Personal specifies AES-CCMP. WLAN vendors have many names for PSK authentication, including WPA/WPA2-Passphrase, WPA/WPA2-PSK, and WPA/WPA2-Preshared Key. For more information, see Chapter 1.

3. C. The original 802.11 standard ratified in 1997 defined the use of a 64-bit or 128-bit static encryption solution called Wired Equivalent Privacy (WEP). WEP is considered pre-RSNA security. Dynamic WEP was never defined under any wireless security standard. The use of 802.1X/EAP, TKIP/RC4, and CCMP/AES are all defined under the current 802.11-2007 standard for robust network security (RSN). For more information, see Chapter 2.

4. D. IPsec and PPTP are considered Layer 3 VPN solutions. Layer 3 VPNs use secure tunneling, which is the process of encapsulating one IP packet within another IP packet. Layer 3 VPNs use Layer 3 encryption; therefore, the payload that is being encrypted is the Layer 4–7 information. The private tunnel IP addresses are encrypted; however, the public IP addresses are still seen in cleartext. WEP uses Layer 2 encryption, which protects Layers 3–7. Many legacy WLAN security solutions used an IPsec VPN combined with WEP encryption. The WEP encryption was used to protect the IPsec VPN’s public IP addresses. For more information, see Chapter 2.

5. E. The graphic depicts a packet capture of an 802.11 data frame protected by the proprietary Fortress encryption protocol. In addition to the Layer 2 encryption defined by the 802.11-2007 standard, proprietary Layer 2 encryption solutions such as xSec and Fortress can also be used for WLAN data privacy. For more information, see Chapter 3.

6. C. WEP, TKIP, and CCMP use symmetric algorithms. WEP and TKIP use the RC4 algorithm. CCMP uses the AES cipher. Public-key cryptography is based on asymmetric communications. For more information, see Chapter 3.

7. A, C. An 802.1X/EAP solution requires that both the supplicant and the authentication server support the same...

Erscheint lt. Verlag 12.4.2011
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Zertifizierung
Schlagworte Certification (MSCE, Novell, etc.) • Prüfungsvorbereitung • Test Prep • Zertifizierung • Zertifizierung f. MSCE u. Novell
ISBN-10 0-470-61964-3 / 0470619643
ISBN-13 978-0-470-61964-3 / 9780470619643
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 16,1 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99