Page 795 - StudyBook.pdf
P. 795
Self Test Appendix • Appendix 779
C. The solution is to place wireless APs on their own separate subnets, in effect creating a kind
of Demilitarized Zone (DMZ) for the wireless network.The wireless subnet could be separated
from the wired corporate network by either a router or a full-featured firewall.Answers A, B
and D are incorrect because your office, the CEO’s office and a secured server room do not
properly meet the security requirements for the AP’s.Answer E is incorrect because the area
over which the radio waves propagate from an electromagnetic source is known as the fresnel
zone.
4. Your wireless network uses WEP to authorize users, but you also use MAC filtering to ensure
that only preauthorized clients can associate with your APs. On Monday morning, you
reviewed the AP association table logs for the previous weekend and noticed that the MAC
address assigned to the network adapter in your portable computer had associated with your
APs several times over the weekend.Your portable computer spent the weekend on your
dining room table and was not connected to your corporate wireless network during this
period of time.What type of wireless network attack are you most likely being subjected to?
A. Spoofing
B. Jamming
C. Sniffing
D. Man in the middle
A.You are the victim of a MAC spoofing attack whereby an attacker has captured valid MAC
addresses by sniffing your wireless network.The fact that you have no other protection in place
has made becoming associated with your APs an easy task for this attacker.
B, C, D.Answer B is incorrect, because jamming attacks are those in which high-power RF
waves are targeted at a wireless network installation with the hope of knocking it out of opera-
tion by overpowering it..Answer C is incorrect, because although your network has been
sniffed previously to obtain the valid MAC address, you are currently being attacked using a
spoofing attack.Answer D is incorrect, because a man-in-the-middle attack is one in which an
attacker sits between two communicating parties, intercepting and manipulating both sides of
the transmission to suit his or her own needs.
5. The biggest weakness in WEP stems from which vulnerability?
A. The reuse of IV values.
B. The ability to crack WEP by statistically determining the WEP key through the Fluhrer-
Mantin-Shamir attack.
C. The ability to spoof MAC addresses thereby bypassing MAC address filters.
D. All of the above.
www.syngress.com