Page 795 - StudyBook.pdf
P. 795

Self Test Appendix • Appendix  779


                  C. The solution is to place wireless APs on their own separate subnets, in effect creating a kind
                    of Demilitarized Zone (DMZ) for the wireless network.The wireless subnet could be separated
                    from the wired corporate network by either a router or a full-featured firewall.Answers A, B
                    and D are incorrect because your office, the CEO’s office and a secured server room do not
                    properly meet the security requirements for the AP’s.Answer E is incorrect because the area
                    over which the radio waves propagate from an electromagnetic source is known as the fresnel
                    zone.

                  4.  Your wireless network uses WEP to authorize users, but you also use MAC filtering to ensure
                      that only preauthorized clients can associate with your APs. On Monday morning, you
                      reviewed the AP association table logs for the previous weekend and noticed that the MAC
                      address assigned to the network adapter in your portable computer had associated with your
                      APs several times over the weekend.Your portable computer spent the weekend on your
                      dining room table and was not connected to your corporate wireless network during this
                      period of time.What type of wireless network attack are you most likely being subjected to?
                      A. Spoofing
                      B. Jamming
                      C. Sniffing
                      D. Man in the middle
                  A.You are the victim of a MAC spoofing attack whereby an attacker has captured valid MAC
                    addresses by sniffing your wireless network.The fact that you have no other protection in place
                    has made becoming associated with your APs an easy task for this attacker.
                    B, C, D.Answer B is incorrect, because jamming attacks are those in which high-power RF
                    waves are targeted at a wireless network installation with the hope of knocking it out of opera-
                    tion by overpowering it..Answer C is incorrect, because although your network has been
                    sniffed previously to obtain the valid MAC address, you are currently being attacked using a
                    spoofing attack.Answer D is incorrect, because a man-in-the-middle attack is one in which an
                    attacker sits between two communicating parties, intercepting and manipulating both sides of
                    the transmission to suit his or her own needs.

                  5.  The biggest weakness in WEP stems from which vulnerability?
                      A. The reuse of IV values.
                      B. The ability to crack WEP by statistically determining the WEP key through the Fluhrer-
                         Mantin-Shamir attack.
                      C. The ability to spoof MAC addresses thereby bypassing MAC address filters.
                      D. All of the above.














                                                                              www.syngress.com
   790   791   792   793   794   795   796   797   798   799   800