Sunday, December 16, 2007

Security: Securing a Wireless Network (WEP vs EFS vs SSID vs MAC vs Ad Hoc)

Your company has a wireless network that connects to a wired network. Your boss is concerned about data being intercepted as it is sent over the wireless network. He wants to ensure that only employees can use the wireless network.
What steps should you take? (Select TWO.)
1. >>Enable WEP.
2. Disable MAC address filtering.
3. >>Disable broadcast SSID.
4. Use ad hoc mode.
5. Enable EFS.

Explanation : You should enable Wired Equivalent Privacy (WEP). Doing so will cause the traffic sent over the wireless network to be encrypted using 40-bit encryption by default. Some access points and wireless network adapters also support 128-bit encryption, so you should use it if it is available. It is also more secure to use dynamic WEP keys if they are supported.
You should also disable broadcast Service Set Identifier (SSID). The SSID is used to publish the availability of the wireless network, sort of like a network name. If you disable broadcast SSID, only clients that are configured with the SSID will be able to find wireless network and connect. This will help prevent non-employees from connecting to the network.

Enabling Encrypting File System (EFS) will not cause data to be encrypted on the network. EFS is used to encrypt files where they are stored, not to encrypt network traffic.

Disabling Media Access Control (MAC) filtering will not resolve the problem. You might or might not want to use MAC filtering. MAC filtering can be used to increase the security of the network by only allowing certain network adapters to connect. However, it is more difficult to manage. Wireless Access Points (WAPs) have MAC filtering disabled by default.

You should not use ad hoc mode. Ad hoc mode is used for peer-to-peer wireless networking. When a WAP connects to a wired network, you need to configure the wireless clients for infrastructure mode. By configuring them for infrastructure mode only, you can prevent them from connecting to ad hoc wireless networks.
Objective: Security