Chapter 8 - Wireless Network Security Flashcards

1
Q

Bluetooth

A

A wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ad hoc topology

A

A configuration in which networks can be created “on the fly” as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

A

An attack that sends unsolicited messages to Bluetooth-enabled devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Near field communication (NFC)

A

A set of standards used to establish communication between devices in very close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Radio frequency identification (RFID)

A

A wireless set of standards used to transmit information from paper-based tags to a proximity reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless local area network (WLAN)

A

A wireless network designed to replace or supplement a wired local area network (LAN). Commonly called Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access point (AP)

A

A centrally located WLAN connection device that can send and receive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ad hoc mode

A

A WLAN functioning without an AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue AP

A

An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evil twin

A

An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a users device will unknowingly connect to this evil twin instead of the authorized AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless replay attack

A

A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attackers presence being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Jamming

A

Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disassociation attack

A

A wireless attack in which false de-authentication or disassociation frames are sent to an AP that appear to come from another client device, causing the client to disconnect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wi-Fi protected setup (WPS)

A

An optional means of configuring security on wireless local area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs. Due to design and implementation flaws, WPS is not considered secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wired Equivalent Privacy (WEP)

A

An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP accomplishes this confidentiality by encrypting the transmissions.

17
Q

Media access control (MAC) address filtering

A

A method for controlling access to a WLAN based on the devices MAC address.

18
Q

Service Set Identifier (SSID)

A

The alphanumeric user-supplied network name of a WLAN.

19
Q

Wi-Fi protected access (WPA)

A

The original set of protections from the Wi-Fi Alliance designed to address both encryption and authentication.

20
Q

Temporal Key Integrity Protocol (TKIP)

A

The WPA and WPA2 encryption technology.

21
Q

Open method

A

A wireless network mode in which no authentication is required.

22
Q

Preshared key (PSK)

A

The authentication model used in WPA that requires a secret key value to be entered in the AP and all approved wireless devices prior to communicating.

23
Q

Wi-Fi Protected Access 2 (WPA2)

A

The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.

24
Q

Counter mode with cipher block chaining message authentication code protocol (CCMP)

A

The encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES.

25
Q

IEEE 802.1x

A

A standard, originally developed for wired networks, that provides a greater degree of security by implementing port-based authentication.

26
Q

Certificate-based authentication

A

An authentication method in which each supplicant computer must have a digital certificate as proof of identity.

27
Q

Extensible authentication protocol (EAP)

A

A framework for transporting authentication protocols that defines the format of the messages.

28
Q

Protected EAP (PEAP)

A

An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords.

29
Q

Rogue AP system detection

A

A means for identifying rogue AP devices.

30
Q

Wireless probe

A

A special sensor that monitors the airwaves for traffic in order to detect rogue AP’s.

31
Q

Fat APs

A

Autonomous AP in which everything is self-contained in a single device.

32
Q

Thin AP

A

An AP that does not contain all the management and configuration functions.

33
Q

Standalone APs

A

An access point (AP) that does not require another device for management.

34
Q

Controller APs

A

An AP that is managed through a dedicated wireless LAN controller (WLC).

35
Q

Captive portal AP

A

An infrastructure that is used on public access WLANs that uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials to provide a higher degree of security.