CH 11 - Wireless Security Flashcards

1
Q

What are the two types of wireless networks?

A. Star and ring
B. Bus and hybrid
C. Infrastructure and hybrid
D. Infrastructure and ad hoc

A

D.
Infrastructure and ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many stages are used in the WPA handshake?

A. Two
B. Four
C. Three
D. One

A

B.
Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What mode has to be enabled on a network interface to allow all headers in wireless traffic to be captured?

A. Promiscuous
B. Monitor
C. Radio
D. Wireless LAN

A

B.
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What wireless attack would you use to take a known piece of information to be able to decrypt wireless traffic?

A. Sniffing
B. Deauthentication
C. Key reinstallation
D. Evil twin

A

C.
Key reinstallation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of performing a Bluetooth scan?

A. Identifying open ports
B. Identifying available profiles
C. Identifying endpoints
D. Identifying vendors

A

C.
Identifying endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a deauthentication attack?

A. Disabling stations
B. Forcing stations to reauthenticate
C. Reducing the number of steps in the handshake
D. Downgrading encryption

A

B.
Forcing stations to reauthenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the policy that allows people to use their own smartphones on the enterprise network?

A. Bring your own device
B. Use your own device
C. Bring your own smart device
D. Use your own smart device

A

A.
Bring your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What part of the encryption process was weak in WEP?

A. Keying
B. Diffie‐Hellman
C. Initialization vector
D. Seeding vector

A

C.
Initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the WPA four‐way handshake used for?

A. Passing keys
B. Deriving keys
C. Encrypting messages
D. Initialization seeding

A

B.
Deriving keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the SSID used for?

A. Encrypting messages
B. Providing an IP address
C. Identifying a network
D. Seeding a key

A

C.
Identifying a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What kind of access point is being used in an evil twin attack?

A. Infrastructure
B. Ad hoc
C. WPA
D. Rogue

A

D.
Rogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does an evil twin attack work?

A. Phishing users for credentials
B. Spoofing an SSID
C. Changing an SSID
D. Injecting four‐way handshakes

A

B.
Spoofing an SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a method to successfully get malware onto a mobile device without having to get the user to do something they wouldn’t normally do?

A. Using the Apple Store or Google Play Store
B. Using external storage on an Android
C. Using a third‐party app store
D. Jailbreaking

A

C.
Using a third‐party app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What would you use a bluebugging attack for?

A. Identifying Bluetooth devices nearby
B. Listening to a physical space
C. Enabling a phone’s camera
D. Gathering data from a target system

A

B.
Listening to a physical space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What would a signal range for a Class A Bluetooth device commonly be?

A. 300 ft.
B. 3,000 ft.
C. 75 ft.
D. 500 ft.

A

A.
300 ft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool could you use to enable sniffing on your wireless network to acquire all headers?

A.Ettercap
B. tcpdump
C. aircrack‐ng
D. airmon‐ng

A

D.
airmon‐ng

17
Q

Why is bluesnarfing potentially more dangerous than bluejacking from the standpoint of the victim?

A. Bluejacking sends while bluesnarfing receives.
B. Bluejacking receives while bluesnarfing sends.
C. Bluejacking installs keyloggers.
D. Bluesnarfing installs keyloggers.

A

B.
Bluejacking receives while bluesnarfing sends.

18
Q

What tool would allow you to run an evil twin attack?

A. Wireshark
B. Ettercap
C. wifiphisher
D. aircrack‐ng

A

C.
wifiphisher

19
Q

What types of authentication are allowed in a WPA‐encrypted network?

A. Handshake and personal
B. Personal and enterprise
C. Enterprise and handshake
D. 802.11 and personal

A

B.
Personal and enterprise

20
Q

What wouldn’t you see when you capture wireless traffic that includes radio headers?

A. Capabilities
B. Probe requests
C. SSIDs
D. Network type

A

D.
Network type

21
Q

What does WPA3 use to start the authentication and association process between stations and access points?

A. Four‐way handshake
B. Mutual authentication of peers
C. Simultaneous authentication of equals
D. Separate authentication with encryption

A

C.
Simultaneous authentication of equals

22
Q

Which of these Bluetooth attacks can result in a denial of service?

A. Bluejacking
B. Bluesnarfing
C. Bluedumping
D. Bluesmack

A

D.
Bluesmack

23
Q

What technique would you likely be using if you had a Pringles can along with a laptop?

A. Bluesnarfing
B. Wireless footprinting
C. Evil twin
D. Key reinstallation

A

B.
Wireless footprinting

24
Q

What piece of information would you need to have to perform a Bluedump attack?

A. BDADDR
B. BDIP
C. IPADDR
D. DUMPADDR

A

A.
BDADDR

25
Q

What type of building material would you select to keep the wireless signal mostly in the building, rather than leaking out?

A. Plywood
B. Glass
C. Sheetrock
D. Concrete

A

D.
Concrete