Chapter 5: Wireless Network Threats Flashcards

1
Q

The IEEE standard that defines port-based security for wireless network access control.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point at which access to a network is accomplished

A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The sending of unsolicited messages over a Bluetooth connection.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The gaining of unauthorized access through a Bluetooth connection.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.

A

Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack in which a rogue wireless access point poses a legitimate wireless service provider to intercept information that users transmit.

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The byproduct of electrical processes.

A

Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that involves looking at repeated results in order to crack the WEP secret key.

A

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Purposely obstructing or interfering with a signal.

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technology that enables communication between devices when they’re “touched” together.

A

Near Field Communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technology that incorporates the use of electromagnetic coupling in the radio frequency (RF) portion of the spectrum to identify items uniquely.

A

Radio Frequency Identification (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An unauthorized wireless access point on a network.

A

Rogue Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is used by the access point of wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network.

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A wireless network operating in the 2.4 GHz or 5 GHz range.

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An authentication process that requires the user to do something in order to complete the enrollment process.

A

Wi-Fi Protected Setup (WPS)

17
Q

A security protocol for 802.11b (wireless) networks that attempts to establish the same security for them as would be present in a wired network.

A

Wired Equivalent Privacy (WEP)

18
Q

A connection device used for clients in a radio frequency (RF) network.

A

Wireless Access Point