CWSP Certified Wireless Security Professional Official Study Guide (eBook)
696 Seiten
Sybex (Verlag)
978-0-470-61964-3 (ISBN)
David D. Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLAN security consultant and technical trainer with over twenty years of IT experience. The company he founded, AirSpy Networks (www.airspy.com), specializes in corporate WLAN training.
David A. Westcott, CWNE #7, CWNA, CWSP, CWNT, is an independent consultant and WLAN technical trainer with over twenty years ofexperience. He has been a certified trainer for over fifteen years.
Bryan E. Harkins, CWNE #44, CWSP,CWNA, CWNT, is the Training and Development Manager for Motorola AirDefense Solutions, a market leader in wireless intrusion prevention systems.
Shawn M. Jackman, CWNE #54, CWNA, CWSP, CWAP is a principal WLAN engineer with Kaiser Permanente. He has over fifteen years' experience working with wireless manufacturers and integrators.
David D. Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLANsecurity consultant and technical trainer with over twenty years ofIT experience. The company he founded, AirSpy Networks(www.airspy.com), specializes in corporate WLAN training. David A. Westcott, CWNE #7, CWNA, CWSP, CWNT, is anindependent consultant and WLAN technical trainer with over twentyyears ofexperience. He has been a certified trainer for overfifteen years. Bryan E. Harkins, CWNE #44, CWSP,CWNA, CWNT, is theTraining and Development Manager for Motorola AirDefense Solutions,a market leader in wireless intrusion prevention systems. Shawn M. Jackman, CWNE #54, CWNA, CWSP, CWAP is aprincipal WLAN engineer with Kaiser Permanente. He has over fifteenyears' experience working with wireless manufacturers andintegrators.
Introduction xxvii
Assessment Test xlii
Chapter 1 WLAN Security Overview 1
Chapter 2 Legacy 802.11 Security 31
Chapter 3 Encryption Ciphers and Methods 65
Chapter 4 Enterprise 802.11 Layer 2 Authentication Methods 101
Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 173
Chapter 6 SOHO 802.11 Security 221
Chapter 7 802.11 Fast Secure Roaming 249
Chapter 8 Wireless Security Risks 291
Chapter 9 Wireless LAN Security Auditing 337
Chapter 10 Wireless Security Monitoring 369
Chapter 11 VPNs, Remote Access, and Guest Access Services 429
Chapter 12 WLAN Security Infrastructure 455
Chapter 13 Wireless Security Policies 509
Appendix A Abbreviations, Acronyms, and Regulations 553
Appendix B WLAN Vendors 575
Appendix C About the Companion CD 579
Glossary 583
Index 623
Assessment Test
1. At which layers of the OSI model does 802.11 technology operate? (Choose all that apply.)
A. Data-Link
B. Network
C. Physical
D. Presentation
E. Transport
2. PSK authentication is mandatory in which of the following? (Choose all that apply.)
A. WPA-Personal
B. WPA Enterprise
C. WPA-2 SOHO
D. WPA-2 Enterprise
E. WPA2-Personal
3. 802.11 pre-RSNA security defines which wireless security solution?
A. Dynamic WEP
B. 802.1X/EAP
C. 128-bit static WEP
D. Temporal Key Integrity Protocol
E. CCMP/AES
4. Which of these legacy security solutions provides Layer 3 data privacy?
A. Open System
B. IPsec VPN
C. PPTP VPN
D. Static WEP with IPsec VPN
5. What type of encryption is shown is this graphic?
A. TKIP/RC4
B. WEP
C. CCMP/AES
D. MPPE
E. Proprietary
6. Which of the following encryption methods use asymmetric communications?
A. WEP
B. TKIP
C. Public-key cryptography
D. CCMP
7. For an 802.1X/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption? (Choose two.)
A. Supplicant
B. Authorizer
C. Authenticator
D. Authentication server
8. Which of these types of EAP do not use tunneled authentication? (Choose all that apply.)
A. EAP-LEAP
B. EAP-PEAPv0 (EAP-MSCHAPv2)
C. EAP-PEAPv1 (EAP-GTC)
D. EAP-FAST
E. EAP-TLS (normal mode)
F. EAP-MD5
9. What type of WLAN security is depicted by this graphic?
A. RSN
B. TSN
C. VPN
D. WPS
E. WMM
10. The 802.11-2007 standard defines authentication and key management (AKM) services. Which of these keys are part of the key hierarchy defined by AKM? (Choose all that apply.)
A. MSK
B. GTK
C. PMK
D. ACK
E. ATK
11. Which of these Wi-Fi Alliance security certifications are intended for use only in a home office environment? (Choose all that apply.)
A. WPA-Personal
B. WPA-Enterprise
C. WPA2-Personal
D. WPA2-Enterprise
E. WPS
12. Which of these fast secure roaming (FSR) methods requires an authenticator and supplicant to establish an entire 802.1X/EAP exchange prior to the creation of dynamic encryption keys when a supplicant is roaming?
A. PMK caching
B. Opportunistic key caching
C. Fast BSS transition
D. Preauthentication
13. What is the main WLAN security risk shown in the graphic below?
A. The ad hoc clients are not using encryption.
B. The ad hoc clients are using weak authentication.
C. The ad hoc clients are not communicating through an access point.
D. The ad hoc client #1 Ethernet card is connected to an 802.3 wired network.
14. Which components of 802.11 medium contention can be compromised by a DoS attack? (Choose all that apply.)
A. Physical carrier sense
B. Interframe spacing
C. Virtual carrier sense
D. Random backoff timer
15. After viewing this graphic, determine which type of WLAN attack tool could be used to create this Layer 1 denial of service to the WLAN.
A. All-band hopping jammer
B. Wide-band jammer
C. Narrow-band jammer
D. Queensland software utility
E. Packet generator
16. Bill is designing a WLAN that will use an integrated WIPS with dedicated full-time sensors. The WLAN predictive modeling software solution that Bill is using has recommended a ratio of one dedicated sensor for every six access points. Bill needs to make sure that the entire building can be monitored at all times, and he is also concerned about the accuracy of location tracking of rogue devices. What considerations should Bill give to sensor placement in order to properly meet his objectives? (Choose all that apply.)
A. Installing the sensors in a straight line
B. Installing the sensors in a staggered arrangement
C. Installing sensors around the building perimeter
D. Increasing the transmit power
E. Installing more sensors
17. Which of these WIDS/WIPS software modules allows an organization to monitor WLAN statistics on hidden nodes, excessive Layer 2 retransmissions, excessive wired to wireless traffic, and excessive client roaming? (Choose all that apply.)
A. Spectrum analysis
B. Protocol analysis
C. Forensic analysis
D. Signature analysis
E. Performance analysis
18. Kate has deployed a remote AP at her house. She wants to use the remote AP to send data back the corporate WLAN controller securely using the remote AP VPN capabilities. She also wants to access a local gateway to the Internet through the remote AP. How can Kate configure the remote AP to meet her needs? (Choose all that apply.)
A. Tunnel mode using the corporate SSID
B. Tunnel mode using the corporate SSID and a guest SSID
C. Bridge mode using the corporate SSID
D. Bridge mode using the corporate SSID and a guest SSID
E. Split-tunnel mode using the corporate SSID
F. Split-tunnel mode using the corporate SSID and a guest SSID
19. Identify the protocols that are normally used to manage WLAN infrastructure devices securely. (Choose all that apply.)
A. HTTPS
B. Telnet
C. SSH2
D. TLS
E. IPsec
F. CCMP/AES
20. What type of WLAN security policy defines WLAN security auditing requirements and policy violation report procedures?
A. Functional policy
B. General policy
C. Protocol policy
D. Performance policy
Answers to Assessment Test
1. A, C. The IEEE 802.11-2007 standard only defines communication mechanisms at the Physical layer and MAC sublayer of the Data-Link layer of the OSI model. For more information, see Chapter 1.
2. A, E. The security used in SOHO environments is preshared key (PSK) authentication. The Wi-Fi Alliance WPA-Personal and WPA2-Personal certifications both use the PSK authentication method; however, WPA-Personal specifies TKIP-RC4 encryption and WPA2-Personal specifies AES-CCMP. WLAN vendors have many names for PSK authentication, including WPA/WPA2-Passphrase, WPA/WPA2-PSK, and WPA/WPA2-Preshared Key. For more information, see Chapter 1.
3. C. The original 802.11 standard ratified in 1997 defined the use of a 64-bit or 128-bit static encryption solution called Wired Equivalent Privacy (WEP). WEP is considered pre-RSNA security. Dynamic WEP was never defined under any wireless security standard. The use of 802.1X/EAP, TKIP/RC4, and CCMP/AES are all defined under the current 802.11-2007 standard for robust network security (RSN). For more information, see Chapter 2.
4. D. IPsec and PPTP are considered Layer 3 VPN solutions. Layer 3 VPNs use secure tunneling, which is the process of encapsulating one IP packet within another IP packet. Layer 3 VPNs use Layer 3 encryption; therefore, the payload that is being encrypted is the Layer 4–7 information. The private tunnel IP addresses are encrypted; however, the public IP addresses are still seen in cleartext. WEP uses Layer 2 encryption, which protects Layers 3–7. Many legacy WLAN security solutions used an IPsec VPN combined with WEP encryption. The WEP encryption was used to protect the IPsec VPN’s public IP addresses. For more information, see Chapter 2.
5. E. The graphic depicts a packet capture of an 802.11 data frame protected by the proprietary Fortress encryption protocol. In addition to the Layer 2 encryption defined by the 802.11-2007 standard, proprietary Layer 2 encryption solutions such as xSec and Fortress can also be used for WLAN data privacy. For more information, see Chapter 3.
6. C. WEP, TKIP, and CCMP use symmetric algorithms. WEP and TKIP use the RC4 algorithm. CCMP uses the AES cipher. Public-key cryptography is based on asymmetric communications. For more information, see Chapter 3.
7. A, C. An 802.1X/EAP solution requires that both the supplicant and the authentication server support the same...
Erscheint lt. Verlag | 12.4.2011 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Weitere Themen ► Zertifizierung | |
Schlagworte | Certification (MSCE, Novell, etc.) • Prüfungsvorbereitung • Test Prep • Zertifizierung • Zertifizierung f. MSCE u. Novell |
ISBN-10 | 0-470-61964-3 / 0470619643 |
ISBN-13 | 978-0-470-61964-3 / 9780470619643 |
Haben Sie eine Frage zum Produkt? |
Größe: 16,1 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich