Hacking Wireless Networks Flashcards
Which of the following technologies is an air interface for 4G and 5G broadband wireless communications?
MIMO-OFDM
FHSS
OFDM
DSSS
MIMO-OFDM - Multiple-in Multiple-out orthogonal frequency-division multiplexing.
Which of the following wireless standards uses modulation schemes such as GFSK, π/4-DPSK, and 8DPSK and a frequency of 2.4 GHz with data transfer rates in the range of 25–50 Mbps?
- 16 (WiMAX)
- 11a
- 11g
- 15.1 (Bluetooth)
802.15.1 (bluetooth)
Which modulations do 802.11a and 802.11g use?
OFDM - orthogonal frequency-division multiplexing
In which of the following is the original data signal multiplied with a pseudo random noise spreading code?
Orthogonal Frequency-division Multiplexing (OFDM)
Frequency-hopping Spread Spectrum (FHSS)
Direct-sequence Spread Spectrum (DSSS)
Multiple input, multiple output-orthogonal frequency-division multiplexing (MIMO-OFDM)
Direct-sequence Spread Spectrum (DSSS)
Which of the following is a standard for Wireless Local Area Networks (WLANs) that provides improved encryption for networks that use 802.11a, 802.11b, and 802.11g standards?
- 11e
- 11i
- 11d
- 11n
802.11i
What is 802.11e used for?
802.11e is used for real-time applications such as voice, VoIP, and video. To ensure that these time-sensitive applications have the network resources they need, 802.11e defines mechanisms to ensure Quality of Service (QoS) to Layer 2 of the reference model, the medium-access layer, or MAC.
What is WiMAX?
WiMAX (Worldwide Interoperability for Microwave Access), is a family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options
Which of the following Wi-Fi security protocols uses GCMP-256 for encryption and HMAC-SHA-384 for authentication?
PEAP
WPA3
WEP
CCMP
WPA3
How can WPA2 be attacked?
WPA2 has a significant vulnerability to an exploit known as key reinstallation attack (KRACK). This exploit may allow attackers to sniff packets, hijack connections, inject malware, and decrypt packets
How can WPA be attacked?
In WPA, vulnerabilities in TKIP allow attackers to guess the IP address of the subnet
How can WEP be attacked?
In WEP, the IV (initialization vector) is a part of the RC4 encryption key, which leads to an analytical attack
How can EAP be attacked?
Vulnerabilities of EAP-TTLS/PAP make it vulnerable to Man-in-the-Middle attack.
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
64 bit and CCMP
128 bit and CRC
128 bit and CCMP
128 bit and TKIP
128-bit key length and CCMP encryption
Which of the following cryptographic algorithms is used by CCMP?
TKIP
DES
AES
RC4
AES
Which of the following Encryption technique is used in WPA?
RSA
AES
TKIP
DES
TKIP
Which of the following protocol encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel?
RADIUS
LEAP
PEAP
CCMP
PEAP
What is LEAP?
LEAP is a proprietary version of EAP developed by Cisco.
What is CCMP?
CCMP is an encryption protocol used in WPA2 for stronger encryption and authentication.
Which of the following consists of 40/104 bit Encryption Key Length?
WEP
WPA
WPA2
RSA
WEP
What is ad-hoc asssociation?
An attacker may perform this kind of attack using any Universal Serial Bus (USB) adapter or wireless card. The attacker connects the host to an unsecured client to attack a specific client or to avoid AP security.
What is a promiscuous client?
Promiscuous clients allow an attacker to transmit target network traffic through a fake AP. It is very similar to the evil-twin threat on wireless networks, in which an attacker launches an AP that poses as an authorized AP by beaconing the WLAN’s SSID.