ch 8 Flashcards

1
Q

Wireless technology that uses short-range radio frequency (R F) transmissions

A

• Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Established when two Bluetooth devices come within range of each other

A

• Piconet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluetooth V5 goes up to

A

800 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One active slave connected to two Masters

A

Scatter net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • an attack that sends unsolicited messages to Bluetooth-enabled devices
    Text messages, images, or sounds
A

• Blue jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection

A

• Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A set of standards used to establish communication between devices in close proximity
Once devices are brought within 4 cm of each other or tapped together, two-way communication is established

A

• (NFC) Near field communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

contains information that other devices can read but does not read or receive any information

A

• Passive NFC device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

can read information as well as transmit data

A

• Active NFC device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

unencrypted NFC communication between the device and terminal can be intercepted and viewed

A

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attackers can ‘bump’ a portable reader to a user’s smart phone in a crowd and make an NFC connection and steal payment information stored on the phone

A

data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an attack can intercept the NFC communications between devices and forge a fictitious response

A

man-in-the-middle-attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the theft of a smart phone could allow the attacker to use that phone for purchases

A

device theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Commonly used to transmit information between employee identification badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader

A

• (R F I D) Radio frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Current version of RFID standards known as

A

Generation 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a rouge RFID reader can determine the inventory on a store shelf to track the sales of specified items

A

unauthorized tag access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

authentic RFID tags are replaced with what that contain fictitious data about products that are not in the inventory

A

fake tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unauthorized users could listen in on communications between RFID tags and readers

A

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is designed to replace or supplement a wired LAN

A

WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most influential organization for computer networking and wireless communications
Dates back to 1884
Began developing network architecture standards in the 1980s
Operates at AP 200 MW

A

• (IEEE) WLANS Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Standard for wireless local area networks (WLANs)
Higher speeds (5.5 Mbps and 11 Mbps)
A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Standard for wireless local area networks (WLANs)

Specifies maximum rated speed of 54Mbps using the 5GHz spectrum

A

• IEEE 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Standard for wireless local area networks (WLANs)

Preserves stable and widely accepted features of 802.11b and increases data transfer rates similar to 802.11a

A

• IEEE 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standard for wireless local area networks (WLANs)
Ratified in 2009
Improvements: speed, coverage area, resistance to interference, and strong security

A

• IEEE 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Standard for wireless local area networks (WLANs) | Ratified in early 2014 and has data rates over 7 Gbps
• IEEE 802.11ac
26
Antenna and radio transmitter/receiver send and receive wireless signals Bridging software to interface wireless devices to other devices -Acts as “base station” for wireless network
• Access point (A P) major parts
27
A WLAN using an A P is operating
• infrastructure mode
28
Network that are not using an A P operate | Devices can only communicate between themselves and cannot connect to another network
• ad hoc mode
29
The Wi-Fi Alliance has created a similar technical specification
• Wi-Fi Direct
30
Used by small offices or home users to connect to the Internet Features included are A P, firewall, router, dynamic host configuration protocol (D H C P) server, and others
• Residential WLAN gateway
31
• for WIFI Boundary is known as a
“hard edge”
32
for WIFI boundries are unknown
“blurred edges”
33
• WIFI goes up to
460 ft.
34
* An unauthorized access point that allows an attacker to bypass network security configurations * Usually set up by an insider (employee)
• Rogue access point
35
A P set up by an attacker | Attempts to mimic an authorized A P
• Evil twin
36
An attacker can pick up the R F signal from an open or misconfigured A P
• Intercepting Wireless Data
37
Also known as “hijacking” The attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker’s presence being detected
• Wireless Replay Attack
38
attackers use intentional R F interference to flood the R F spectrum with enough interference to prevent a device from communicating with the A P
R F jamming
39
attackers craft a fictitious frame that pretends to come from a trusted client when it actually comes from the attacker
Spoofing
40
- attackers send a frame with the duration field set to a high value, preventing other devices from transmitting for that period of time
Manipulating duration field values
41
most home users fail to configure any security on their home networks
• Wireless Home Attacks
42
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmissions Encrypts plaintext into cipher text
• W E P –
43
Method of controlling WLAN access | Limit a device’s access to AP
• MAC Address Filtering
44
Addresses exchanged in unencrypted format Attacker can see address of approved device and substitute it on his own device Managing large number of addresses is challenging
• Vulnerabilities of MAC address filtering
45
The user-supplied network name of a wireless network; usually broadcast so that any device can see it
• (S S ID) Service Set Identifier
46
• (W P A)
Wi-Fi Protected Access
47
modes of WPA:
W P A Personal W P A Enterprise W P A addresses both encryption and authentication
48
• (T K I P)
Temporal Key Integrity Protocol
49
Uses a longer 128 bit key than W E P
• (T K I P) Temporal Key Integrity Protocol
50
• (M I C)
Message Integrity Check
51
designed to prevent man-in-the-middle attacks
• (M I C) Message Integrity Check
52
• (P S K)
Preshared Key
53
Authentication for W P A Personal | After A P configured, client device must have same key value entered
• (P S K) Preshared Key
54
• (W P A 2)
Wi-Fi Protected Access 2
55
Two modes of WPA2:
W P A 2 Personal | W P A 2 Enterprise
56
• (A E S)
Advanced Encryption Standard
57
performs three steps on every block (128 bits) of plaintext Within second step, multiple iterations are performed Bytes are substituted and rearranged
• (A E S) Advanced Encryption Standard
58
• (C C M P)
The Cipher Block Chaining Message Authentication Code
59
provides data integrity and authentication Both C C M P and T K I P use a 128-bit key for encryption Both methods use a 64-bit M I C value
• (C B C-M A C) The Cipher Block Chaining Message Authentication Code
60
Originally developed for wired networks Provides greater degree of security by implementing port-based authentication Blocks all traffic on a port-by-port basis until client is authenticated
• IEEE 802.1x Authentication
61
A framework for transporting authentication protocols | Defines message format
• (E A P) Extensible Authentication Protocol
62
- is Protected E A P
• (PEAP) A common EAP protocol
63
this product uses digital certificates for authentication
EAP-TLS
64
what are the 4 types of rouge AP discovery tools
wireless device probe, desktop probe, access point probe, dedicated probe
65
what are autonomous ap's that have intelligence required to manage wireless authentication, encryption, and other functions of wireless devices they serve
fat or thick AP's
66
what AP's do not contain all the management and configuration functions of a fat AP
lightweight or this AP's
67
what can controller AP's be managed through
(WLC) Wireless LAN Controllers
68
where should an antenna and an AP be positioned
near the center of a coverage area placed high on a wall to reduce signal obstructions and deter theft.
69
what can you do for wireless peripheral protection
updating or replacing any venerable devices, switching to more fully tested Bluetooth mice and keyboards, substitute with a weird mouse or keyboard.