1500 Flashcards
The encryption protocol standard for WPA2.
AES-CCMP
An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings.
Bluetooth
An AP set up by an attacker to mimic an authorized AP and capture transmissions - so a user’s device will unknowingly connect to this evil twin instead.
Evil Twin
A framework for transporting authentication protocols that defines the format of the messages.
Extensible Authentication Protocol (EAP)
A 24-bit value used in WEP that changes each time a packet is encrypted.
Initialization Vector (IV)
A method of determining the keystream by analyzing two packets that were created from the same initialization vector (IV).
Keystream Attack (IV Attack)
A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software.
Lightweight EAP (LEAP)
A method for controlling access to a WLAN based on the device’s MAC address.
Media Access Control (MAC) Address Filtering
A key value that must be created and entered into both the access point and all wireless devices (“shared”) prior to (“pre”) the devices communicating with the AP.
Preshared Key (PSK)
An EAP method designed to simplify the deployment of 802.11x by using Microsoft Windows logins and passwords.
Protected EAP (PEAP)
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its user to attacks.
Rogue Access Point
The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters.
Service Set Identifier (SSID)
The transmission of the SSID from the access point to wireless devices.
SSID Broadcast
A WPA encryption technology.
Temporal Key Integrity Protocol (TKIP)
The process of documenting and then advertising the location of wireless LANs for others to use. Wireless networks were identified by drawing on sidewalks or walls around the area of the network.
War Chalking
Searching for wireless signals from an automobile or on foot suing a portable computing device.
War Driving
The original set of protections from the Wi-Fi Alliance in 2003 designed to protect both present and future wireless devices.
Wi-Fi Protected Access (WPA)
The second generation of WPA security from the Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs.
Wi-Fi Protected Access 2 (WPA2)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
Wired Equivalent Privacy (WEP)
Bluetooth falls under the category of __________. A. local area network (LAN) B. short area network (SAN) C. paired-device network (PDN) D. personal area network (PAN)
D. personal area network (PAN)
A Bluetooth network that contains one master and at least one slave using the same RF channel forms a __________. A. cluster B. grouping C. scatteringnet D. piconet
D. piconet
____________ is the unauthorized access of information from a wireless device through a Bluetooth connection. A. Bluejacking B. Bluetooth snatching C. Bluetooth spoofing D. Bluesnarfing
D. bluesnarfing
The IEEE ___________ standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum. A. 802.11 B. 802.11a C. 802.11b D. 802.11g
B. 802.11a
Each of the following is an advantage of IEEE 802.11n except __________. A. smaller coverage area B. faster speed C. less interference D. stronger security
A. smaller coverage area
Which of the following is not found in a residential WLAN gateway? A. intrusion detection system (IDS) B. firewall C. router D. dynamic host configuration protocol (DHCP)
A. intrusion detection system (IDS)
Which of the following is not a requirement for war driving? A. wireless NIC adapter B. antennas C. GPS receiver D. mobile computer device
C. GPS receiver
The primary design of a(n) __________ is to capture the transmission from legitimate users. A. evil twin B. Bluetooth grabber C. WEP D. rogue access point
D. rogue access point
Which of the following is a vulnerability of MAC address filtering? A. the user must enter the MAC B. APs use IP addresses instead of MACs C. Not all operating systems support MACs D. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format
D. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format
Each of the following is a limitation of turning off the SSID broadcast from an AP except ___________. A. the SSID can easily be discovered - even when it is not contained in beacon frames - because it still is transmitted in other management frames sent by AP B. turning off the SSIB broadcast may prevent users form being able to freely roam from one AP coverage area to another C. some versions of operating systems favor a network broadcasting an SSID over one that does not D. users can more easily roam from on WLAN to another
D. users can more easily roam from on WLAN to another
The primary weakness of wired equivalent privacy (WEP) is __________. A. it usage creates a detectable pattern B. initialization vectors (IVs) are difficult for users to manage C. its only functions on specific brands of APs D. it slows down a WLAN from 104 Mbps to 16 Mbps
A. its usage creates a detectable pattern
The two models for personal wireless security developed by the Wi-Fi Alliance are Wi-Fi Protected Access (WPA) and __________. A. Protected Wireless Security (WPS) B. IEEE 802.11ai C. Postshared Key Protection (PKP) D. Wi-Fi Protected Access 2 (WPA2)
D. Wi-Fi Protected Access 2 (WPA2)
WPA replaces WEP with __________. A. Temporal Key Integrity Protocol (TKIP) B. Cyclic Redundancy Check (CRC) C. Message Integrity Check (MIC) D. WPA2
A. Temporal Key Integrity Protocol (TKIP)
A preshared key (PSK) of fewer than __________ characters may be subject to an attack if that key is a common dictionary word. A. 6 B. 12 C. 16 D. 20
D. 20
A WEP key that is 128 bits in length __________. A. cannot be used on access points that use passphrases B. is less secure than a WEP key of 64 bits because shorter keys are stronger C. has an initialization vector (IV) that is the same length as a WEP key of 64 bits D. cannot be cracked because it is too long
C. has an initialization vector (IV) that is the same length as a WEP key of 64 bits
AES-CCMP is the encryption protocol standard used in __________. A. WPA2 B. IEEE 802.11 C. WPA D. Bluetooth
A. WPA2
What is the Extensible Authentication Protocol (EAP)? A. a subset of WPA2 B. the protocol used in TCP/IP for authentication C. a framework for transporting authentication protocols D. a technology used by IEEE 802.11 for encryption
C. a framework for transporting authentication protocols
Which technology should be used instead of LEAP? A. STREAK B. LEAP-2 C. REAP D. PEAP
D. PEAP
Each of the following is a type of wireless AP probe except __________. A. wireless device probe B. dedicated probe C. AP probe D. WNIC probe
D. WNIC probe