ML_deck_4817091 Flashcards
T/F. Pg 492 Roue access points are access points that you do not control.
True
Pg 492 Rouge access points that are connected to your wired infrastructure are usually ____?
Usually used as part of a hijacking attack, which is discussed in the next section.
What is an Evil twin? Pg 492
An Evil twin is an AP that is not under your control but is used to perform a hijacking attack.
What is a hijacking attack? Pg 492
A hijacking attack is one in which the hacker connects one or more of your user’s computers to their network for the purpose of a peer-to-peer network
What is a Blue-jacking attack? Pg 943
it’s an attack aimed at Bluetooth connections
Pg 493. Network attacks that is executed by an actual hacker are called ____?
Direct attacks
Pg 493 “Never talk to stranger” applies what?
applies here because you can’t spot a hacker by looking at one.
T/F User should not be advised to disable the function that makes their device “discoverable” and enable it manually only when a connection needs to be made. Pg 493
False
The process of leading into a computer network can be termed as what? pg 494
Backdoors
The ___ created a temporary solution called ___. that was an improvement on WEP. Pg 492
Wi-Fi Alliance and Wi-Fi Protected Access