Page 796 - StudyBook.pdf
P. 796

780    Appendix • Self Test Appendix


              Answer B is correct. By far the most devastating attack against WEP is the Fluhrer-Mantin-
                 Shamir attack of statistically determining the WEP key.This allows an attacker to crack a WEP
                 key within hours and thereby gain full access to the wireless network or to the traffic on it.
                 Answer A is incorrect.While the reuse of IV values does provide a significant problem (and in
                 fact leads to the success, in some cases, of the Fluhrer-Mantin-Shamir attack) it is not as great a
                 threat as FMS.Answer C is incorrect.The capability to spoof MAC addresses is not a problem
                 with WEP, but rather with 802.11 as a whole.Answer D is incorrect.

              6.  The tool NetStumbler detects wireless networks based on what feature?
                  A. SSID
                  B. WEP key
                  C. MAC address
                  D. CRC-32 checksum
              Answer A is correct. NetStumbler detects wireless networks by looking for SSIDs.Answer B is
                 incorrect. NetStumbler does identify networks with WEP enabled, but does not use that fact in
                 identifying the network.Answer C is incorrect. NetStumbler does detect clients and APs based
                 on their MAC but does not use this information for identifying wireless networks.Answer D is
                 incorrect because CRC-32 checksums are of no concern to NetStumbler.

              7.  Some DoS attacks are unintentional.Your wireless network at home has been having sporadic
                  problems.The wireless network is particularly susceptible in the afternoon and the evenings.
                  This is most likely due to which of the following possible problems?
                  A. The AP is flaky and needs to be replaced.
                  B. Someone is flooding your AP with traffic in a DoS attack.
                  C. The wireless network is misconfigured.
                  D. Your cordless phone is using the same frequency as the wireless network and whenever
                      someone calls or receives a call the phone jams the wireless network.
              Answer D is correct.The most likely problem is that a cordless phone (or a microwave or one
                 of many other wireless devices) is jamming the wireless signal because it uses the same fre-
                 quency.This is becoming more and more common as cordless phone manufacturers use the 2.4
                 GHz frequency.Answer A may be possible, but should not be considered seriously until other
                 sources of the problem are ruled out.Answer B is possible but unlikely.Answer C is incorrect
                 because misconfiguration of the wireless network would probably result in the problem occur-
                 ring at all times, rather than just in the afternoon or evenings.

              8.  The 802.1x standard requires the use of an authentication server to allow access to the wire-
                  less LAN.You are deploying a wireless network and will use EAP-TLS as your authentication
                  method.What is the most likely vulnerability in your network?











          www.syngress.com
   791   792   793   794   795   796   797   798   799   800   801