Ch 8 Key Terms Flashcards

1
Q

secure tunnels client password authentication within TLS records

EAP-TTLS

CCMP

EAP-TLS

WEP-SHA1

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a centrally located WLAN connection device that can send and receive information

AP

WPA

WLAN

WPS

A

AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

designed to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs

WAP

WPA

WPS

WLAN

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sends unsolicited messages to Bluetooth-enabled devices

Bluesmurfing

Blueponic

Bluejacking

Bluesnarfing

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an AP setup by the attacker; designed to mimic an authorized AP, so a user’s mobile device will unknowingly connect to this evil twin AP

evil twin

de-authentication

disassociation attack

rogue AP

A

evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wi-Fi Protected Access addresses both encryption and authentication; designed goal was to fit into existing WEP engine

WPS

WEP-SHA1

EAP

WPA

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless client device that they serve

WPS

AP

EAP-TLS

EAP-TTLS

A

AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

uses digital certificates for authentication

EAP-TLS

EAP-TTLS

WAP

WEP

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication for the WPA2 Enterprise model; implements port-based authentication

IEEE 802.x1

IEEE 802.1q

IEEE 802.x

IEEE 802.1x

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

extraneous RF signal noise that creates interference and prevents communications from occurring

rogue AP

EMI

jamming

CCMP

A

jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a set of standards used to establish communication between devices in very close proximity

WPA

AP

RFID

NFC

A

NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

designed to simplify the deployment of 802.1x by using MS Windows logins and passwords; creates an encrypted channel between the client and the authentication server, and the channel then protects the subsequent user authentication exchange

WPS

WAP

EAP

PEAP

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

authentication for WPA Personal

PEAP

PSK

EAP

TKIP

A

PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

functions as a wrapper around WEP by adding an additional layer of security but preserving WEP’s basic functionality

EAP

TKIP

PSA

WEP-SHA1

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

encryption protocol used for WPA2; specifies the use of CCM with AES

TKIP

PSA

WPA

CCMP

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attacker creating false de-authentication frames that appear to come from another client device causing the client to disconnect from the AP

disassociation attack

rogue CCMP

jamming

evil twin

A

disassociation attack

17
Q

an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks

AP

rogue AP

WPA

rogue WPA

A

rogue AP

18
Q

devices can only communicate between themselves and cannot connect to another network

ad hoc mode

CCMP

WPA

infrastructure mode

A

ad hoc mode

19
Q

an attack that accesses unauthorized information from a wireless device through Bluetooth connection, often between cell phones and laptop computers

Bluesnarfing

Bluejacking

Blueponic

Bluesmurfing

A

Bluesnarfing

20
Q

most secure form of IEEE 802.1x authentication; each supplicant computer must have a digital certificate as proof of its identity

Extensible Authentication

digital certificate authentication

CCMP

certificate-based authentication

A

certificate-based authentication