Ch. 11 Security Administration Flashcards

1
Q

Bluejacking

A

Unsolicited messages are sent to Bluetooth devices when in range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluesnarfing

A

Data is taken from a Bluetooth device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COPE

A

Company-Owned and Provided Equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CYOD

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EDGE

A

Enhanced Data Rates for GSM Evolution. This does not fit neatly into the 2G/3G/4G spectrum, Technically considered pre-3G, but an improvement on GSM (2G). Developed by ETSI and bridged 2G and 3G networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evil Twin

A

Rogue wireless access point that mimics the SSID of a legitimate access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GSM

A

Global System for Mobile communications. AKA 2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LTE

A

Long Term Evolution - Standard for wireless communication of high-speed data for mobile devices. AKA 4G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UMTS

A

Universal Mobile Telecommunications Systems - 3G standard based on GSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11a

A

The first wireless standard - 5-GHz with a max data rate 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11b

A

2nd wireless standard - max data rate 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IEEE 802.11g

A

2.4 GHz frequency range - downward compatible with 802.11b devices with a max data reduced to 11 Mbps - Max throughput 54 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11n

A

Can operate at 5 GHz or 2.4 GHz. Compatible with a, b, and g but might not support MIMO technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MIMO

A

Multiple In Multiple Out technology uses two or more streams of data transmission to increase data throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IEEE 802.11n-2009

A

Uses MIMO - Gets bandwidth of up to 600 Mbps - uses multiple antennas to resolve more information coherently than possible using a single antenna

17
Q

802.11ax

A

Consists of 802.11ac, 802.11ad, 802.11af

18
Q

802.11ac

A

Approved January 2014, Throughput of up to 1 Gbps with at least 500 Mbps. It uses up to 8 MIMO

19
Q

802.11ad

A

This standard was developed by the Wireless Gigabyte Alliance . Supports data transmission rates up to 7 Gbps- more than 10 times faster than the highest 802.11n rate.

20
Q

802.11af

A

AKA “White-Fi” and “Super Wi-Fi” was approved in February 2014. It allows WLAN operation in the TV White space spectrum in the VHF and UHF bands between 54 and 790 MHz.

21
Q

Wired Equivalent Privacy (WEP)

A

Flawed, oldest wireless security

22
Q

WPA WiFi Protected Access (WPA)

A

Uses Temporal Key Integrity Protocol (TKIP), 128 bit per packet key, dynamically generates a new key for each packet. Introduced with Windows XP Service Pack 1, it combined authentication with encryption.

23
Q

WPA2

A

Based on IEEE 802.11i standard. Provides AES (Advanced Encryption Standard) using the Counter Mode-Cipher Block Chaining (CBC)- Message Authentication Code (MAC) Protocol (CCMP)

24
Q

Three different methods of wireless security

A
  1. WEP
  2. WPA
  3. WPA2
25
Q

Disassociation

A

Attacker sends a deauthentication packet to the wireless access point, spoofing the user’s IP address. The user is logged off and deauthenticated on the WAP. Mutual authentication is the best defense against this.

26
Q

NFC - Near Field Communication

A

Radio wave transmission that automatically connects when in range, which is a short distance. Traffic is not encrypted unless the user encrypts it.

27
Q

Rogue Access Point

A

An unauthorized access point is set up and users connect to it

28
Q

Evil Twin

A

Rogue Access Point that copies the SSID of a legitimate access point

29
Q

ANT (Not an acronym)

A

Proprietary wireless network technology that provides low power modes, and it is used in Wi-Fi settings. Uses 2.4 GHz frequency with a range of about 30 meters.

30
Q

Infrared

A

Not widely used today, has line-of sight issues

31
Q

SATCOM

A

Satellite communications - data is not secure as it can go through an out-of-network device or service during communication.

32
Q

Minimum Security Measures to be placed on Mobile Devices

A
  1. Screen Lock
  2. Strong Password
  3. Device Encryption
  4. Remote Wipe/Sanitation
  5. GPS Tracking
  6. Device Access Control
  7. Asset Tracking
  8. Content Management
33
Q

Jailbreaking

A

User takes administrative/root control - Security controls are circumventing security controls f the iTunes store.

34
Q

Sideloading

A

Transferring data between two devices and often associated with installing Android apps from places other than Google Play

35
Q

Over-the-Air updates (OTA)

A

Whenever a device connects to your wireless network, the device is updated

36
Q

Carrier-Unlocking

A

A security concern when you move from the carrier that issued to the phone to another carrier.