SELECT: Self-Learning Collision Avoidance for Wireless Networks
Wireless (Security) Self-Test for fun
description
Transcript of Wireless (Security) Self-Test for fun
![Page 1: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/1.jpg)
Wireless (Security) Self-Test for fun
Presented by:J.D. Fulp, [email protected] Lecturer of Computer
ScienceNaval Postgraduate School (NPS)Monterey, CA USA
Unclassified
1MWC Q&A Session
![Page 2: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/2.jpg)
Late Addition to the Workshop! Hey... I just want to attend and listen/learn!
MWC Q&A Session 2
![Page 3: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/3.jpg)
Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more
“sophisticated” listener/attendee
MWC Q&A Session 3
![Page 4: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/4.jpg)
Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more
“sophisticated” listener/attendee New Idea (thanks John!): Present on what you found in
these docs
MWC Q&A Session 4
![Page 5: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/5.jpg)
Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more
“sophisticated” listener/attendee New Idea (thanks John!): Present on what you found in
these docs Modification to the New Idea: The docs mostly read with
the excitement of an encyclopedia, and are likely known by these “select” attendees, so...
MWC Q&A Session 5
![Page 6: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/6.jpg)
Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more
“sophisticated” listener/attendee New Idea (thanks John!): Present on what you found in
these docs Modification to the New Idea: The docs mostly read with
the excitement of an encyclopedia, and are likely known by these “select” attendees, so...
Present in a Q&A form to assess knowledge and perhaps “incite” discussion
MWC Q&A Session 6
![Page 7: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/7.jpg)
Which “related docs” ?
DoDD 8100.2 Use of Commercial Wireless Devices, Services, and
Technologies in the Department of Defense (DoD) Global Information Grid (GIG)
NIST SP800-124 Guidelines on Cell Phone and PDA Security
DISA STIG Wireless Overview
DISA STIG Mobile and Wireless Device Addendum to the Wireless STIG
MWC Q&A Session 7
![Page 8: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/8.jpg)
What KIND of Questions? Miscellaneous Wireless Terms/Technology Security: Threats Security: Vulnerabilities Security: Security_Controls Security: Policy Security: Best Practices Security: Technology
By the way... don’t expect any special “ordering” of any of this!
MWC Q&A Session 8
![Page 9: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/9.jpg)
Misc Wireless Terms/TechnologyWhat does WiFi stand for?
MWC Q&A Session 9
![Page 10: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/10.jpg)
Misc Wireless Terms/TechnologyWhat does WiFi stand for?
Wireless Fidelity
MWC Q&A Session 10
![Page 11: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/11.jpg)
Misc Wireless Terms/TechnologyWhich term applies to Bluetooth?
a.WMAN
b.WGAN
c. WPAN
d.WLAN
MWC Q&A Session 11
![Page 12: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/12.jpg)
Misc Wireless Terms/TechnologyWhich term applies to Bluetooth?
a.WMAN
b.WGAN
c. WPAN
d.WLAN
MWC Q&A Session 12
![Page 13: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/13.jpg)
Misc Wireless Terms/TechnologyWhich operates at 5GHz?
a.802.11a
b.802.11b
c. 802.11g
d.802.11n
MWC Q&A Session 13
![Page 14: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/14.jpg)
Misc Wireless Terms/TechnologyWhich operates at 5GHz?
a.802.11a
b.802.11b
c. 802.11g
d.802.11n
MWC Q&A Session 14
![Page 15: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/15.jpg)
Misc Wireless Terms/TechnologyWhat is IEEE 802.16 ?
a.WiMAX
b.ZigBee
c. EDGE
d.Bluetooth
MWC Q&A Session 15
![Page 16: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/16.jpg)
Misc Wireless Terms/TechnologyWhat is IEEE 802.16 ?
a.WiMAX
b.ZigBee
c. EDGE
d.Bluetooth
MWC Q&A Session 16
![Page 17: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/17.jpg)
Misc Wireless Terms/TechnologyWho uses CDMA based cell tech.?
a.Verizon
b.AT&T
MWC Q&A Session 17
![Page 18: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/18.jpg)
Misc Wireless Terms/TechnologyWho uses CDMA based cell tech.?
a.Verizon
b.AT&T
MWC Q&A Session 18
![Page 19: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/19.jpg)
Misc Wireless Terms/TechnologyWhich is the shortest range RF tech?
a.802.11
b.Vicinity RFID (smart card/chip)
c. WiMAX
d.Proximity RFID (smart card/chip)
MWC Q&A Session 19
![Page 20: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/20.jpg)
Misc Wireless Terms/TechnologyWhich is the shortest range RF tech?
a.802.11
b.Vicinity RFID (smart card/chip)
c. WiMAX
d.Proximity RFID (smart card/chip)
MWC Q&A Session 20
![Page 21: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/21.jpg)
Misc Wireless Terms/TechnologyThe two main 802.11 “modes” are Ad
Hoc mode and...
MWC Q&A Session 21
![Page 22: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/22.jpg)
Misc Wireless Terms/TechnologyThe two main 802.11 “modes” are Ad
Hoc mode and...
Infrastructure mode
MWC Q&A Session 22
![Page 23: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/23.jpg)
Misc Wireless Terms/TechnologyThe “Evil Twin” threat is aka...
a.A promiscuous eavesdropper
b.An RF-jammer box
c. “War-driving” setup
d.a rogue wireless access point
MWC Q&A Session 23
![Page 24: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/24.jpg)
Misc Wireless Terms/TechnologyThe “Evil Twin” threat is aka...
a.A promiscuous eavesdropper
b.An RF-jammer box
c. “War-driving” setup
d.a rogue wireless access point
MWC Q&A Session 24
![Page 25: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/25.jpg)
Misc Wireless Terms/TechnologyWhich is THE DoD IA Directive?
a.8200.1
b.8500.1
c. 8510.01
d.5200.40
MWC Q&A Session 25
![Page 26: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/26.jpg)
Misc Wireless Terms/TechnologyWhich is THE DoD IA Directive?
a.8200.1
b.8500.1
c. 8510.01
d.5200.40
MWC Q&A Session 26
![Page 27: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/27.jpg)
Misc Wireless Terms/TechnologyWhich is the correct ordering for typical
operating range?a. IrDA—Bluetooth—802.11—WiMax--GSM
b.802.11—IrDA—GSM—Bluetooth—WiMAX
c. Bluetooth—802.11—IrDA—WiMAX—GSM
d.GSM—IrDA—Bluetooth—802.11--WiMAX
MWC Q&A Session 27
![Page 28: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/28.jpg)
Misc Wireless Terms/TechnologyWhich is the correct ordering for typical
operating range?a. IrDA—Bluetooth—802.11—WiMax--GSM
b.802.11—IrDA—GSM—Bluetooth—WiMAX
c. Bluetooth—802.11—IrDA—WiMAX—GSM
d.GSM—IrDA—Bluetooth—802.11--WiMAX
MWC Q&A Session 28
![Page 29: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/29.jpg)
Misc Wireless Terms/TechnologyMost Cell phones operate in the...
a.HF range (3-30MHz)
b.HF and VHF range (3-300MHz)
c. UHF range (300MHz-3GHz)
d.SHF range (3-30GHz)
MWC Q&A Session 29
![Page 30: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/30.jpg)
Misc Wireless Terms/TechnologyMost Cell phones operate in the...
a.HF range (3-30MHz)
b.HF and VHF range (3-300MHz)
c. UHF range (300MHz-3GHz)
d.SHF range (3-30GHz)
MWC Q&A Session 30
![Page 31: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/31.jpg)
Misc Wireless Terms/TechnologyWhich is the closest to typical longest
operating range of WiMAX?a.1 mile
b.5 miles
c. 30 miles
d.100 miles
MWC Q&A Session 31
![Page 32: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/32.jpg)
Misc Wireless Terms/TechnologyWhich is the closest to typical longest
operating range of WiMAX?a.1 mile
b.5 miles
c. 30 miles
d.100 miles
MWC Q&A Session 32
![Page 33: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/33.jpg)
Misc Wireless Terms/TechnologyWhich is the closest to typical longest
operating range of Bluetooth?a.1 meter
b.10 meters
c. 100 meters
d.1 mile
MWC Q&A Session 33
![Page 34: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/34.jpg)
Misc Wireless Terms/TechnologyWhich is the closest to typical longest
operating range of Bluetooth?a.1 meter
b.10 meters (most often seen/quoted)
c. 100 meters (mentioned in Wireless STIG)
d.1 mile
MWC Q&A Session 34
![Page 35: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/35.jpg)
8100.2
What’s a PIM, PED, PDA?
MWC Q&A Session 35
![Page 36: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/36.jpg)
8100.2
What’s a PIM, PED, PDA?
Personal Information Mgr
Personal Electronic Device
Personal Digital Assistant
MWC Q&A Session 36
![Page 37: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/37.jpg)
8100.2
Which does 8100.2 apply to?a.Receive-only pagers
b.GPS receivers
c. Implanted medical devices
d.RF energy between RFID tags
Section 2.5
MWC Q&A Session 37
![Page 38: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/38.jpg)
8100.2
Which does 8100.2 apply to?
None of these
Section 2.5
MWC Q&A Session 38
![Page 39: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/39.jpg)
8100.2
Exceptions/deviations from required security controls usually (always?) require the approval of the DAA. What is a DAA?
Section 4.1.2
MWC Q&A Session 39
![Page 40: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/40.jpg)
8100.2
Exceptions/deviations from required security controls usually (always?) require the approval of the DAA. What is a DAA?
Designated Approving Authority
Section 4.1.2
MWC Q&A Session 40
![Page 41: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/41.jpg)
8100.2
Which pub is heavily referenced for security issues related to crypto-graphic module validation?
a.FIPS 199
b.DCID 6/9
c. FIPS 140-2
d.NSTISSI 4009
MWC Q&A Session 41
![Page 42: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/42.jpg)
8100.2
Which pub is heavily referenced for security issues related to crypto-graphic module validation?
a.FIPS 199
b.DCID 6/9
c. FIPS 140-2
d.NSTISSI 4009
MWC Q&A Session 42
![Page 43: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/43.jpg)
8100.2
Measures taken to mitigate DoS attacks should address?
a.Only external threats
b.Only internal threats
c. Potential “friendly interference”
d.All of the above
Section 4.1.4
MWC Q&A Session 43
![Page 44: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/44.jpg)
8100.2
Measures taken to mitigate DoS attacks should address?
a.Only external threats
b.Only internal threats
c. Potential “friendly interference”
d.All of the above
Section 4.1.4
MWC Q&A Session 44
![Page 45: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/45.jpg)
8100.2
The term (title) CTTA pops up often when discussing wireless emissions and security. What is CTTA?
a.Certified TEMPEST Technical Authority
b.Communications TecSec Tech. Auth.
c. Counter-technical Transmission Analyst
d.Consolidated TEMPEST Testing AgencySection 4.3
MWC Q&A Session 45
![Page 46: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/46.jpg)
8100.2
The term (title) CTTA pops up often when discussing wireless emissions and security. What is CTTA?
a.Certified TEMPEST Technical Authority
b.Communications TecSec Tech. Auth.
c. Counter-technical Transmission Analyst
d.Consolidated TEMPEST Testing AgencySection 4.3
MWC Q&A Session 46
![Page 47: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/47.jpg)
8100.2
What is the DITSCAP?
Section 4.5
MWC Q&A Session 47
![Page 48: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/48.jpg)
8100.2
What is the DITSCAP?
DoD Information Technology Security Certification and Accreditation Process
Section 4.5
MWC Q&A Session 48
![Page 49: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/49.jpg)
8100.2
(T/F) DoD component must actively screen for wireless devices [including] active e-m sensing at the premises to detect/prevent unauthor-ized access of DoD ISs... to ensure compliance with DITSCAP ongoing accreditation.
Section 4.5
MWC Q&A Session 49
![Page 50: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/50.jpg)
8100.2
(T/F) DoD component must actively screen for wireless devices [including] active e-m sensing at the premises to detect/prevent unauthor-ized access of DoD ISs... to ensure compliance with DITSCAP ongoing accreditation.
Section 4.5
MWC Q&A Session 50
![Page 51: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/51.jpg)
8100.2
PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted.
Section 4.7
MWC Q&A Session 51
![Page 52: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/52.jpg)
8100.2
PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted.
Insufficient input... what additional info do you think we need to answer this?
Section 4.7
MWC Q&A Session 52
![Page 53: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/53.jpg)
8100.2
PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted to operate wirelessly while directly connected.
Section 4.7
MWC Q&A Session 53
![Page 54: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/54.jpg)
8100.2
PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted to operate wirelessly while directly connected.
Section 4.7
MWC Q&A Session 54
![Page 55: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/55.jpg)
Wireless STIG Overview
When discussing/categorizng vuln-nerabilities, the term CAT is used. What is CAT short for?
Section 1.4
MWC Q&A Session 55
![Page 56: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/56.jpg)
Wireless STIG Overview
When discussing/categorizng vuln-nerabilities, the term CAT is used. What is CAT short for?
Severity Category Code
Section 1.4
MWC Q&A Session 56
![Page 57: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/57.jpg)
Wireless STIG Overview
If analysis of your system reveals a CAT I severity...
a.You can still receive an ATO
b.To get an ATO, this must be mitigated.
c. You may have <= 1 CAT I and still get an ATO
d.You cannot get an ATO with even a single CAT I severity
Section 1.4
MWC Q&A Session 57
![Page 58: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/58.jpg)
Wireless STIG Overview
If analysis of your system reveals a CAT I severity...
a.You can still receive an ATO
b.To get an ATO, this must be mitigated.
c. You may have <= 1 CAT I and still get an ATO
d.You cannot get an ATO with even a single CAT I severity
Section 1.4
MWC Q&A Session 58
![Page 59: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/59.jpg)
Wireless STIG Overview
CAT codes are also used to charac-terize attackers/threats. How is each defined?
a.CAT 1
b.CAT 2
c. CAT 3
Section 1.4
MWC Q&A Session 59
![Page 60: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/60.jpg)
Wireless STIG Overview
CAT codes are also used to charac-terize attackers/threats. How is each defined?
a.CAT 1-no special skill/resource required
b.CAT 2-some sp s/r or mux-exploitations required
c. CAT 3-requires unusual expertise, additional information, and/or mux-exploitations
Section 1.4
MWC Q&A Session 60
![Page 61: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/61.jpg)
Wireless STIG Overview
Two types of WLAN APs may be used in a DoD network: enclave-NIPRNet Connected, and Internet Gateway Only Connected. What’s the difference?
Section 2.2.1
MWC Q&A Session 61
![Page 62: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/62.jpg)
Wireless STIG Overview
Two types of WLAN APs may be used in a DoD network: Enclave-NIPRNet Connected, and Internet Gateway Only Connected. What’s the difference? Enclave provides connectivity to the inside network, whereas Gateway provides a connection to the Internet only
MWC Q&A Session 62
![Page 63: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/63.jpg)
Wireless STIG Overview
Which WAP devices are currently apvd for class’d WLAN comms?
a.SecNet11 (Harris Corp.)
b.SecNet54 (Harris Corp.)
c. KOV-26 Talon (L3 Communications)
Section 2.2.4
MWC Q&A Session 63
![Page 64: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/64.jpg)
Wireless STIG Overview
Which WAP devices are currently apvd for class’d WLAN comms?
a.SecNet11 (Harris Corp.)
b.SecNet54 (Harris Corp.)
c. KOV-26 Talon (L3 Communications)
Section 2.2.4
MWC Q&A Session 64
![Page 65: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/65.jpg)
Wireless STIG Overview
To what level of classification?a.SecNet11 (Harris Corp.)
b.SecNet54 (Harris Corp.)
c. KOV-26 Talon (L3 Communications)
Section 2.2.4
MWC Q&A Session 65
![Page 66: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/66.jpg)
Wireless STIG Overview
To what level of classification?a.SecNet11 (Harris Corp.) - S
b.SecNet54 (Harris Corp.) - TS
c. KOV-26 Talon (L3 Communications) - TS
Section 2.2.4
MWC Q&A Session 66
![Page 67: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/67.jpg)
Wireless STIG Overview
What’s a WIDS?
Section 2.2.4
MWC Q&A Session 67
![Page 68: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/68.jpg)
Wireless STIG Overview
What’s a WIDS?
Wireless Intrusion Detection System
Section 2.2.4
MWC Q&A Session 68
![Page 69: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/69.jpg)
Wireless STIG Overview
ZigBee is closest in “mission” to?a.RFID
b.Bluetooth
c. 802.11
d.WiMAX
Section 2.5
MWC Q&A Session 69
![Page 70: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/70.jpg)
Wireless STIG Overview
ZigBee is closest in “mission” to?a.RFID
b.Bluetooth
c. 802.11
d.WiMAX
Section 2.5
MWC Q&A Session 70
![Page 71: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/71.jpg)
Wireless STIG Overview
Which best describes the difference between ZigBee & Bluetooth?
a.ZigBee uses less power (better battery life)
b.ZigBee has lower data rate
c. ZigBee used for device-device comms whereas Bluetooth is used for human interface devices
d.ZigBee is not used by DoDSection 2.5
MWC Q&A Session 71
![Page 72: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/72.jpg)
Wireless STIG Overview
Which best describes the difference between ZigBee & Bluetooth?
a.ZigBee uses less power (better battery life)
b.ZigBee has lower data rate
c. ZigBee used for device-device comms whereas Bluetooth is used for human interface devices
d.ZigBee is not used by DoDSection 2.5
MWC Q&A Session 72
![Page 73: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/73.jpg)
Wireless STIG Overview
Cellular...are generally considered (more / less) secure than public WLAN or WiMAX...and should be preferred by DoD sites for wireless remote access to DoD networks.
Section 2.7
MWC Q&A Session 73
![Page 74: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/74.jpg)
Wireless STIG Overview
Cellular...are generally considered (more / less) secure than public WLAN or WiMAX...and should be preferred by DoD sites for wireless remote access to DoD networks.
Section 2.7
MWC Q&A Session 74
![Page 75: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/75.jpg)
Wireless STIG Overview
A recent study reported over ___% of wireless devices identified during a wireless scan at several U.S. airports to be illegitimate (i.e., not part of the airport sanctioned wireless network)
Section 2.7
MWC Q&A Session 75
![Page 76: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/76.jpg)
Wireless STIG Overview
A recent study reported over 50 % of wireless devices identified during a wireless scan at several U.S. airports to be illegitimate (i.e., not part of the airport sanctioned wireless network)
Whoa!
Section 2.7
MWC Q&A Session 76
![Page 77: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/77.jpg)
SP800-124
Basically, what is 1G cellular?a.< 100kbps
b.Analog
c. Digital (voice only, no data)
d.TDMA (vice CDMA)
Section 2.5
MWC Q&A Session 77
![Page 78: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/78.jpg)
SP800-124
Basically, what is 1G cellular?a.< 100kbps
b.Analog
c. Digital (voice only, no data)
d.TDMA (vice CDMA)
Section 2.5
MWC Q&A Session 78
![Page 79: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/79.jpg)
SP800-124
Which are the two dominant digital cellular networks in the U.S.?
a. iDEN
b.TDMA
c. CDMA
d.GSM
MWC Q&A Session 79
![Page 80: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/80.jpg)
SP800-124
Which are the two dominant digital cellular networks in the U.S.?
a. iDEN
b.TDMA
c. CDMA
d.GSM
MWC Q&A Session 80
![Page 81: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/81.jpg)
SP800-124
Indicate GSM or CDMA regarding these “evolutionary” enhancements
a.EDGE
b.1xRTT
c. EV-DO
d.UMTS
Section 2.5
MWC Q&A Session 81
![Page 82: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/82.jpg)
SP800-124
Indicate GSM or CDMA regarding these “evolutionary” enhancements
a.EDGE -- GSM
b.1xRTT -- CDMA
c. EV-DO -- CDMA
d.UMTS -- GSM
Section 2.5
MWC Q&A Session 82
![Page 83: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/83.jpg)
SP800-124
What does SIM stand for, and in which cell system (GSM or CDMA) do we find it?
Section 2.2.2
MWC Q&A Session 83
![Page 84: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/84.jpg)
SP800-124
What does SIM stand for, and in which cell system (GSM or CDMA) do we find it?
Subscriber Identity Module, GSM
Section 2.2.2
MWC Q&A Session 84
![Page 85: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/85.jpg)
SP800-124
What is the primary purpose of the SIM?
Section 2.2.2
MWC Q&A Session 85
![Page 86: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/86.jpg)
SP800-124
What is the primary purpose of the SIM?
Authenticates the phone to the netowork
Section 2.2.2
MWC Q&A Session 86
![Page 87: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/87.jpg)
SP800-124
The IMSI is the # in the SIM which uniquely identifies the phone. What is IMSI?
Section 2.2.2
MWC Q&A Session 87
![Page 88: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/88.jpg)
SP800-124
The IMSI is the # in the SIM which uniquely identifies the phone. What is IMSI?
International Mobile Subscriber Identity
Section 2.2.2
MWC Q&A Session 88
![Page 89: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/89.jpg)
SP800-124
Is SIM-like functionality on the horizon for CDMA networks?
Section 2.2.2
MWC Q&A Session 89
![Page 90: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/90.jpg)
SP800-124
Is SIM-like functionality on the horizon for CDMA networks?
Yes, one such reference is to a R-UIM (Removable – User Identity Module)
Section 2.2.2
MWC Q&A Session 90
![Page 91: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/91.jpg)
SP800-124
With respect to the discussion of keys and key strength (entropy), what is the distinction between an on-line and an off-line attack?
MWC Q&A Session 91
![Page 92: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/92.jpg)
SP800-124
With respect to the discussion of keys and key strength (entropy), what is the distinction between an on-line and an off-line attack?
On-line: attacker is “bruting” via the device’s primary/intended secret entry interface
Off-line: attacker is “bruting” directly to the device; bypassing the normal/intended interface
MWC Q&A Session 92
![Page 93: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/93.jpg)
SP800-124
Short (4-8 digits) PINs are often criticized as insufficient to thwart a guessing attack. What added security mechanism can mitigate the risk of such small PIN spaces?
MWC Q&A Session 93
![Page 94: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/94.jpg)
SP800-124
Short (4-8 digits) PINs are often criticized as insufficient to thwart a guessing attack. What added security mechanism can mitigate the risk of such small PIN spaces?
For on-line attacks, only permit a small number of incorrect guesses
MWC Q&A Session 94
![Page 95: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/95.jpg)
Mobile & Wireless Device AddendumWhen discussing IA security controls,
we typically chose them based upon the confidentiality level and MAC of the information on the system in question. What is MAC?
Section 1.2
MWC Q&A Session 95
![Page 96: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/96.jpg)
Mobile & Wireless Device AddendumWhen discussing IA security controls,
we typically chose them based upon the confidentiality level and MAC of the information on the system in question. What is MAC?
Mission Assurance Category
Section 1.2
MWC Q&A Session 96
![Page 97: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/97.jpg)
Mobile & Wireless Device AddendumHow does the MAC relate to the CIA
Triad of Confidentiality, Integrity, and Availability?
Section 1.4
MWC Q&A Session 97
![Page 98: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/98.jpg)
Mobile & Wireless Device AddendumHow does the MAC relate to the CIA
Triad of Confidentiality, Integrity, and Availability?
It’s a combination of the Integrity and Availability (MAC1=HH, MAC2=HM, and MAC3=BB)
Section 1.4
MWC Q&A Session 98
![Page 99: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/99.jpg)
Mobile & Wireless Device Addendum7 areas are addressed in this adden-
dum for security guidelines1 OS Security
2 __________ Security
3 Transmission Protection
4 __________ (emanations) Security
5 Access Control
6 Data Protection
7 User TrainingSection 4.1
MWC Q&A Session 99
![Page 100: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/100.jpg)
Mobile & Wireless Device Addendum7 areas are addressed in this adden-
dum for security guidelines1 OS Security
2 Application Security
3 Transmission Protection
4 TEMPEST (emanations) Security
5 Access Control
6 Data Protection
7 User TrainingSection 4.1
MWC Q&A Session 100
![Page 101: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/101.jpg)
Mobile & Wireless Device AddendumOne big issue with OS security is the
notion of a separation kernel. What is the purpose of a separation kernel?
Section 4.1.1
MWC Q&A Session 101
![Page 102: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/102.jpg)
Mobile & Wireless Device AddendumOne big issue with OS security is the notion of a
separation kernel. What is the purpose of a separation kernel?
Basically; a) protect against possible high-to-low (data flows) and b) separate subjects and objects so that access must be granted IAW a policy-enforcing mechanism
Section 4.1.1
MWC Q&A Session 102
![Page 103: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/103.jpg)
Mobile & Wireless Device AddendumWhen the topic of access control
arises, we often see a reference to AAA. What is AAA?
Section 4.1.5
MWC Q&A Session 103
![Page 104: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/104.jpg)
Mobile & Wireless Device AddendumWhen the topic of access control
arises, we often see a reference to AAA. What is AAA?
Authenticate, Authorize, Audit
Section 4.1.5
MWC Q&A Session 104
![Page 105: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/105.jpg)
Mobile & Wireless Device AddendumRegarding the area of data protection, we
often hear about DAR and FDE. What is each of these?
Data-At-Rest and Full-Disk Encryption. The idea is that we are beginning to pay attention to encrypting data at-rest in addition to data in-transit; which we have been doing for quite a long(er) time.
Section 4.1.6
MWC Q&A Session 105
![Page 106: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/106.jpg)
Mobile & Wireless Device AddendumWhat is the necessary precursor to
access control?a.authorization decision
b.audit solution
c. I&A
d.object classification
Section 2.5
MWC Q&A Session 106
![Page 107: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/107.jpg)
Mobile & Wireless Device AddendumWhat is the necessary precursor to
access control?a.authorization decision
b.audit solution
c. I&A (Identification & Authentication)
d.object classification
App. D (Security Mechanisms)
MWC Q&A Session 107
![Page 108: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/108.jpg)
Mobile & Wireless Device AddendumWhat are the 3 methods used to
authenticate (i.e., prove and identity claim)?
a.What you ________
b.What you ________
c. What you ________
App. D
MWC Q&A Session 108
![Page 109: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/109.jpg)
Mobile & Wireless Device AddendumWhat are the 3 methods used to
authenticate (i.e., prove and identity claim)?
a.What you know
b.What you have
c. What you are
App. D.1
MWC Q&A Session 109
![Page 110: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/110.jpg)
Mobile & Wireless Device AddendumWhen you get down to brass tacks...
they’re all have forms. The real distinction is...
a._______________________________
b._______________________________
MWC Q&A Session 110
![Page 111: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/111.jpg)
Mobile & Wireless Device AddendumWhen you get down to brass tacks...
they’re all have forms. The real distinction is...
a.whether it’s a unique & permanent part of you (biometric), or
b.whether it is a secret (in which case it will either be one of public or private)
MWC Q&A Session 111
![Page 112: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/112.jpg)
Mobile & Wireless Device AddendumAs usual (INFOSEC) we are
ultimate-ly concerned with protecting the CIA of the wireless information. What are the two main tools to protect the C and I ?
a.__________ Security (think low tech)
b.____________(hashing and encryption)
MWC Q&A Session 112
![Page 113: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/113.jpg)
Mobile & Wireless Device AddendumAs usual (INFOSEC) we are
ultimate-ly concerned with protecting the CIA of the wireless information. What are the two main tools to protect the C and I ?
a.Physical Security (think low tech)
b.Cryptography (hashing and encryption)
MWC Q&A Session 113
![Page 114: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/114.jpg)
Mobile & Wireless Device AddendumWhat are the 3 primary encryption
algorithms approved for use (2 are symmetric and 1 is asymmetric)?
a._____
b._____
c. _____
MWC Q&A Session 114
![Page 115: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/115.jpg)
Mobile & Wireless Device AddendumWhat are the 3 primary encryption
algorithms approved for use (2 are symmetric and 1 is asymmetric)?
a.DES (Date Encryption Std, older)
b.AES (Advanced Encryption Std, newer)
c. RSA (the asymmetric one)
MWC Q&A Session 115
![Page 116: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/116.jpg)
Mobile & Wireless Device AddendumWhat are the 2 primary hash
algorithms approved for use to support integrity check mechanisms?
a._____
b._____
MWC Q&A Session 116
![Page 117: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/117.jpg)
Mobile & Wireless Device AddendumWhat are the 2 primary hash
algorithms approved for use to support integrity check mechanisms?
a.MD5 (Message Digest 5, 128 bits)
b.SHA (Secure Hash Algorithm, comes in 160, 224, 256, 384, and 512 bit versions)
MWC Q&A Session 117
![Page 118: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/118.jpg)
Mobile & Wireless Device AddendumFor secret-based authentication
that’s easier to setup, we generally employ ____; whereas for secret-based authentication that’s more scalable, we generally employ ____.
Choices are: a) PKI, b) biometrics, or c) pre-shared (symmetric) secrets
MWC Q&A Session 118
![Page 119: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/119.jpg)
Mobile & Wireless Device AddendumFor secret-based authentication
that’s easier to setup, we generally employ __a_; whereas for secret-based authentication that’s more scalable, we generally employ _c_.
Choices are: a) PKI, b) biometrics, or c) pre-shared (symmetric) secrets
MWC Q&A Session 119
![Page 120: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/120.jpg)
Mobile & Wireless Device AddendumAES has three key lengths, 128, 192,
and 256. Which are appropriate for secret information, and which for top secret?
a.Secret: __________
b.Top Secret: __________
MWC Q&A Session 120
![Page 121: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/121.jpg)
Mobile & Wireless Device AddendumAES has three key lengths, 128, 192,
and 256. Which are appropriate for secret information, and which for top secret?
a.Secret: all three
b.Top Secret: only 192 and 256
MWC Q&A Session 121
![Page 122: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/122.jpg)
Mobile & Wireless Device AddendumWhich of these 3 WiFi security tech-
nologies (protocols) is approved for DoD use?
a.WEP
b.WPA-TKIP
c. 802.11i
App. D
MWC Q&A Session 122
![Page 123: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/123.jpg)
Mobile & Wireless Device AddendumWhich of these 3 WiFi security tech-
nologies (protocols) is approved for DoD use?
a.WEP
b.WPA-TKIP
c. 802.11i
App. D
MWC Q&A Session 123
![Page 124: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/124.jpg)
Mobile & Wireless Device Addendum802.11i is perhaps more commonly
know as _______?
MWC Q&A Session 124
![Page 125: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/125.jpg)
Mobile & Wireless Device Addendum802.11i is perhaps more commonly
know as WPA2, and also RSN (Robust Security Network)?
This uses the stronger (and FIPS 140-2 approved) AES cipher whereas WEP and WPA(1) use the weaker RC4 stream cipher
MWC Q&A Session 125
![Page 126: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/126.jpg)
Mobile & Wireless Device AddendumTwo methods of “RF Monitoring” (for
wireless networks) are discussed. One is to employ a “roving” sniffer; what do you think is the other?
MWC Q&A Session 126
![Page 127: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/127.jpg)
Mobile & Wireless Device AddendumTwo methods of “RF Monitoring” (for
wireless networks) are discussed. One is to employ a “roving” sniffer; what do you think is the other?
Install wireless sensors at various locations (to cover all RF “space”) on the network and have them report back to a central management/monitor console
MWC Q&A Session 127
![Page 128: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/128.jpg)
Mobile & Wireless Device AddendumWhich attack is the most serious in
terms of potential for damage?a.sniffing/observation
b.data modification (blind)
c. data replay (or impersonation)
d.denial of service
e.man-in-the-middle
MWC Q&A Session 128
![Page 129: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/129.jpg)
Mobile & Wireless Device AddendumWhich attack is the most serious in
terms of potential for damage?a.sniffing/observation
b.data modification (blind)
c. data replay (or impersonation)
d.denial of service
e.man-in-the-middle
MWC Q&A Session 129
![Page 130: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/130.jpg)
Mobile & Wireless Device AddendumEAP comes in several different
“flavors” and is an important security tool for wireless environments. What does EAP stand for?
MWC Q&A Session 130
![Page 131: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/131.jpg)
Mobile & Wireless Device AddendumEAP comes in several different
“flavors” and is an important security tool for wireless environments. What does EAP stand for?Extensible Authentication Protocol (basically a “meta-protocol” that employs secrets to authenticate via a dedicated authentication server)
MWC Q&A Session 131
![Page 132: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/132.jpg)
Mobile & Wireless Device AddendumMost/all wireless security best
practices say to disable SSID. What is SSID and why should it be disabled?
MWC Q&A Session 132
![Page 133: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/133.jpg)
Mobile & Wireless Device AddendumIPSec is a popular layer-3 VPN. Which
mode should be used if the tunnel endpoints should begin and end at/on two communicating hosts?
a.Tunnel mode
b.Transport mode
c. AH mode
d.ESP mode
MWC Q&A Session 133
![Page 134: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/134.jpg)
Mobile & Wireless Device AddendumIPSec is a popular layer-3 VPN. Which
mode should be used if the tunnel endpoints should begin and end at/on two communicating hosts?
a.Tunnel mode
b.Transport mode
c. AH mode
d.ESP mode
MWC Q&A Session 134
![Page 135: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/135.jpg)
Mobile & Wireless Device AddendumWhich mode of IPSec should be used
if we wish to provide confidentiality?a.Tunnel mode
b.Transport mode
c. AH mode
d.ESP mode
MWC Q&A Session 135
![Page 136: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/136.jpg)
Mobile & Wireless Device AddendumWhich mode of IPSec should be used
if we wish to provide confidentiality?a.Tunnel mode
b.Transport mode
c. AH mode
d.ESP mode
MWC Q&A Session 136
![Page 137: Wireless (Security) Self-Test for fun](https://reader035.fdocuments.us/reader035/viewer/2022062519/56814d6c550346895dbabacc/html5/thumbnails/137.jpg)
Finished