ch 8 Flashcards

1
Q

Wireless technology that uses short-range radio frequency (R F) transmissions

A

• Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Established when two Bluetooth devices come within range of each other

A

• Piconet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluetooth V5 goes up to

A

800 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One active slave connected to two Masters

A

Scatter net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • an attack that sends unsolicited messages to Bluetooth-enabled devices
    Text messages, images, or sounds
A

• Blue jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection

A

• Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A set of standards used to establish communication between devices in close proximity
Once devices are brought within 4 cm of each other or tapped together, two-way communication is established

A

• (NFC) Near field communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

contains information that other devices can read but does not read or receive any information

A

• Passive NFC device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

can read information as well as transmit data

A

• Active NFC device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

unencrypted NFC communication between the device and terminal can be intercepted and viewed

A

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attackers can ‘bump’ a portable reader to a user’s smart phone in a crowd and make an NFC connection and steal payment information stored on the phone

A

data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an attack can intercept the NFC communications between devices and forge a fictitious response

A

man-in-the-middle-attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the theft of a smart phone could allow the attacker to use that phone for purchases

A

device theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Commonly used to transmit information between employee identification badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader

A

• (R F I D) Radio frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Current version of RFID standards known as

A

Generation 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a rouge RFID reader can determine the inventory on a store shelf to track the sales of specified items

A

unauthorized tag access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

authentic RFID tags are replaced with what that contain fictitious data about products that are not in the inventory

A

fake tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unauthorized users could listen in on communications between RFID tags and readers

A

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is designed to replace or supplement a wired LAN

A

WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most influential organization for computer networking and wireless communications
Dates back to 1884
Began developing network architecture standards in the 1980s
Operates at AP 200 MW

A

• (IEEE) WLANS Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Standard for wireless local area networks (WLANs)
Higher speeds (5.5 Mbps and 11 Mbps)
A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Standard for wireless local area networks (WLANs)

Specifies maximum rated speed of 54Mbps using the 5GHz spectrum

A

• IEEE 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Standard for wireless local area networks (WLANs)

Preserves stable and widely accepted features of 802.11b and increases data transfer rates similar to 802.11a

A

• IEEE 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standard for wireless local area networks (WLANs)
Ratified in 2009
Improvements: speed, coverage area, resistance to interference, and strong security

A

• IEEE 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Standard for wireless local area networks (WLANs)

Ratified in early 2014 and has data rates over 7 Gbps

A

• IEEE 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Antenna and radio transmitter/receiver send and receive wireless signals
Bridging software to interface wireless devices to other devices
-Acts as “base station” for wireless network

A

• Access point (A P) major parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A WLAN using an A P is operating

A

• infrastructure mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Network that are not using an A P operate

Devices can only communicate between themselves and cannot connect to another network

A

• ad hoc mode

29
Q

The Wi-Fi Alliance has created a similar technical specification

A

• Wi-Fi Direct

30
Q

Used by small offices or home users to connect to the Internet
Features included are A P, firewall, router, dynamic host configuration protocol (D H C P) server, and others

A

• Residential WLAN gateway

31
Q

• for WIFI Boundary is known as a

A

“hard edge”

32
Q

for WIFI boundries are unknown

A

“blurred edges”

33
Q

• WIFI goes up to

A

460 ft.

34
Q
  • An unauthorized access point that allows an attacker to bypass network security configurations
  • Usually set up by an insider (employee)
A

• Rogue access point

35
Q

A P set up by an attacker

Attempts to mimic an authorized A P

A

• Evil twin

36
Q

An attacker can pick up the R F signal from an open or misconfigured A P

A

• Intercepting Wireless Data

37
Q

Also known as “hijacking”
The attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker’s presence being detected

A

• Wireless Replay Attack

38
Q

attackers use intentional R F interference to flood the R F spectrum with enough interference to prevent a device from communicating with the A P

A

R F jamming

39
Q

attackers craft a fictitious frame that pretends to come from a trusted client when it actually comes from the attacker

A

Spoofing

40
Q
  • attackers send a frame with the duration field set to a high value, preventing other devices from transmitting for that period of time
A

Manipulating duration field values

41
Q

most home users fail to configure any security on their home networks

A

• Wireless Home Attacks

42
Q

An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmissions
Encrypts plaintext into cipher text

A

• W E P –

43
Q

Method of controlling WLAN access

Limit a device’s access to AP

A

• MAC Address Filtering

44
Q

Addresses exchanged in unencrypted format
Attacker can see address of approved device and substitute it on his own device
Managing large number of addresses is challenging

A

• Vulnerabilities of MAC address filtering

45
Q

The user-supplied network name of a wireless network; usually broadcast so that any device can see it

A

• (S S ID) Service Set Identifier

46
Q

• (W P A)

A

Wi-Fi Protected Access

47
Q

modes of WPA:

A

W P A Personal
W P A Enterprise
W P A addresses both encryption and authentication

48
Q

• (T K I P)

A

Temporal Key Integrity Protocol

49
Q

Uses a longer 128 bit key than W E P

A

• (T K I P) Temporal Key Integrity Protocol

50
Q

• (M I C)

A

Message Integrity Check

51
Q

designed to prevent man-in-the-middle attacks

A

• (M I C) Message Integrity Check

52
Q

• (P S K)

A

Preshared Key

53
Q

Authentication for W P A Personal

After A P configured, client device must have same key value entered

A

• (P S K) Preshared Key

54
Q

• (W P A 2)

A

Wi-Fi Protected Access 2

55
Q

Two modes of WPA2:

A

W P A 2 Personal

W P A 2 Enterprise

56
Q

• (A E S)

A

Advanced Encryption Standard

57
Q

performs three steps on every block (128 bits) of plaintext
Within second step, multiple iterations are performed
Bytes are substituted and rearranged

A

• (A E S) Advanced Encryption Standard

58
Q

• (C C M P)

A

The Cipher Block Chaining Message Authentication Code

59
Q

provides data integrity and authentication
Both C C M P and T K I P use a 128-bit key for encryption
Both methods use a 64-bit M I C value

A

• (C B C-M A C) The Cipher Block Chaining Message Authentication Code

60
Q

Originally developed for wired networks
Provides greater degree of security by implementing port-based authentication
Blocks all traffic on a port-by-port basis until client is authenticated

A

• IEEE 802.1x Authentication

61
Q

A framework for transporting authentication protocols

Defines message format

A

• (E A P) Extensible Authentication Protocol

62
Q
  • is Protected E A P
A

• (PEAP) A common EAP protocol

63
Q

this product uses digital certificates for authentication

A

EAP-TLS

64
Q

what are the 4 types of rouge AP discovery tools

A

wireless device probe, desktop probe, access point probe, dedicated probe

65
Q

what are autonomous ap’s that have intelligence required to manage wireless authentication, encryption, and other functions of wireless devices they serve

A

fat or thick AP’s

66
Q

what AP’s do not contain all the management and configuration functions of a fat AP

A

lightweight or this AP’s

67
Q

what can controller AP’s be managed through

A

(WLC) Wireless LAN Controllers

68
Q

where should an antenna and an AP be positioned

A

near the center of a coverage area placed high on a wall to reduce signal obstructions and deter theft.

69
Q

what can you do for wireless peripheral protection

A

updating or replacing any venerable devices, switching to more fully tested Bluetooth mice and keyboards, substitute with a weird mouse or keyboard.