Chapter 10: Wireless Network Attacks and Defenses Flashcards

1
Q

How do you mitigate MITM attacks for NFCs?

A

Devices can be configured in pairing where one device only transmits/sends while the other device can only receive -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you prevent eavesdropping with NFCs?

A

Users should be aware of their surrounding when making payments, don’t let someone get close to intercept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Rouge AP?

A

An unauthorized access point that allows an attacker to bypass network security configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Bluesnarfing?

A

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluejacking?

A

An attack that sends unsolicited messages to Bluetooth-enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is MAC address filtering?

A

A list to configure on a switch that can either allow all MAC address, deny or allow specific MAC address - It is usually implemented by explicitly specifying the MAC addresses of devices that are allowed to connect instead of preventing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RFID cloning?

A

Capturing data through RFID and then transferring the data to another RFID tag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Thin APs?

A

APs that do not have a lot of options for configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Residential WLAN gateways?

A

An AP that has a lot of configuration options, combines a firewall, router, and DHC into one hardware device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is jamming in a wireless environment?

A

Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is EAP?

A

A framework for transporting authentication protocols instead of the authentication protocol itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is PEAP?

A

Protected EAP - An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords - Creates encrypted channel between the client and authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is 802.1x?

A

A standard for network access control, specifically designed to increase security by providing a way for authenticating devices that connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a duration field values attack?

A

A wireless attack designed to prevent access to a client through manipulating duration field values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly