Ojo.Josiah.Test 3 Part 1x

acceptablepeasSecurity

Nov 30, 2013 (3 years and 8 months ago)

78 views

IST 462





NAME ___________________________

Network Security

Test 3



After answering the following questions, change the name of your file to
LastName.FirstName.Test3

Part1

and copy your file to the correct folder on

Blackhawk.


Do all your work on your desktop. Do
not
use a flash drive or any Internet resources.



1.

What

was the name of the original IEEE standard for

wireless transmissions
?


802.11




2.

How do most wireless access points
control

access from a remote device?


Me
dia access control filtering



3.

What is the purpose of WEP?


Use to encrypt packets with 64 bit or 128 bit numbers.



4.

Describe the process WEP uses to encrypt data.


WEP take unencrypted text and encrypts it by scrambling it into a text that cannot be

viewed by
unauthorized parties.


5.

What is the SSID and how is it used for authentication?


The SSID is associated with the packets and the beaconing of the system.



6.

Why is MAC address filtering considered weak?


The e
nc
ryption patterns allow for the

packets to be compromised.


7.

Why is WEP considered to be weak?


It create initialization vectors that make detectable patterns


8.

PSK serves two purposes. What are they?


Preshared key create
s

password generated


9.

Explain the difference between the
three terms: identification, authentication, and
authorization.

Identification
-

the basic level of who the user is.

Authentication
-

the verifying of the users credentials

Authorization
-

the granting of access to users.



10.

Of the access control models di
scussed in class, which one is closest to “group
permissions?”


MAC



12.

What does the “enforce password history” policy do?

This policy creates a block on previously used passwords.



13.

What does the “maximum password age” policy do?


I
t

set
s

a
n

amount of days that the password will be valid before its time is up.


14.

If “enforce password history” is set to 12 and “maximum password age” is set to 10,
then how many days must elapse before a user can reuse a previous password?


120 days


15.

Descr
ibe how a time
-
synchronized one
-
time password with a token works.

The password is initially obtained then the token. The token responds to an authentication server
to validate the password within a framed period of time.



16.

How can the above password s
ystem be compromised?


It can be hacked.


17.

Explain how keystroke dynamics might be used to authenticate a user.


It’s a system that can determine the user base upon the flight of the keystroke and the amount of
time a keystroke is held.


18.

Give an
example of cognitive biometrics that can be used to authenticate a user.


An example of cognitive biometrics would be a authentication based upon something about that
person or something related to that person that they can identify.


19.

What is an
advantage of VPN?


Its saves cost, it also provides a greater level of security, and the speed.


20.

What is an disadvantage of VPN?


a disadvantage of VPN is the
overall management of it.