Module 11 - Wireless Network Security Q Flashcards
Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?
Bluesnarfing
Bluesnarfing is a type of attack that uses unauthorized access to steal information from a wireless device through a Bluetooth connection. In a Bluesnarfing attack, the attacker can copy emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?
Evil twin
An evil twin is designed to mimic an authorized access point (AP) so that a user’s mobile device, such as a laptop or tablet, unknowingly connects to the evil twin instead. Attackers can then capture the transmissions from users to the evil twin access point (AP
Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so?
A WLAN consumer attack, because many users fail to properly configure security on their home WLANs
Attacks against consumers’ home WLANs are considered easy because many users fail to properly configure security on their home wireless networks. Attackers access insecure wireless networks for multiple reasons, including to steal data, read wireless transmissions, and inject malware
What is the difference between protecting against eavesdropping and protecting against a man-in-the-middle (MITM) attack?
Eavesdropping can be prevented by being aware of one’s surroundings while using NFC technology, while MITM attack can be prevented by configuring in a pairing method so only one side can send and the other can receive it at a time
In eavesdropping attacks, the attacker must be extremely close to pick up the signal; hence, it can be prevented if users are aware of their surroundings while making a payment. In MITM attacks, the attacker can interfere with NFC communications between devices and send false responses. This can be prevented by configuring the device in pairing so one device can only send while the other can only receive
Which of the following statements correctly defines jamming?
An attacker intentionally floods the RF spectrum with extraneous RF signal “noise” that creates interference and prevents communications
Jamming occurs when an attacker intentionally floods the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring
Which of the following contains the field that indicates the function of the packet and an identifier field used to match requests and responses and the type of data being transported along with the data itself?
EAP
An extensible authentication protocol (EAP) packet contains a field that indicates the packet’s function (such as response or request) and an identifier field used to match requests and responses. Response and request packets also have a field that indicates the type of data being transported (such as an authentication protocol) along with the data itself
In which of the following attacks do attackers use intentional interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP?
Wireless denial of service attacks
In wireless denial of service (DoS) attacks, which are also referred to as jamming, the attacker can use intentional radio frequency (RF) interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP. This attack prevents the transmission of data to or from network devices
In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?
Eavesdropping
In eavesdropping, unauthorized users can listen to communications between RFID tags and readers
What type of APs can be managed by wireless LAN controllers (WLCs)?
Controller AP
Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is a single device that can be configured and then used to automatically distribute the settings to all controller APs. A remote office WLAN controller manages multiple WLCs at remote sites from a central location
Why are jamming attacks generally rare?
They require expensive, sophisticated equipment
Jamming attacks generally are rare because sophisticated and expensive equipment is necessary to flood the RF spectrum with enough interference to impact the network
Which site survey tool is used to visually represent wireless network details such as channel bandwidth, channel coverage, data rate, and interference, among others?
Wi-Fi analyzers
A Wi-Fi analyzer helps to visualize essential details of the wireless network. An analyzer can provide information such as signal strength, network health, channel bandwidth, channel coverage, data rate, and interference (noise).
Which wireless probe is designed to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?
Wireless device probe
A standard wireless device, such as a portable laptop computer, can be configured to act as a wireless probe. At regular intervals during the normal course of operation, the device can scan and record wireless signals within its range and report this information to a centralized database. The scanning is performed when the device is idle and not receiving any transmissions. Using several mobile devices as wireless device probes can provide a high degree of accuracy in identifying rogue access points
Which security protocol encrypts transmissions by using a shared secret key combined with an initialization vector (IV) that changes each time a packet is encrypted?
WEP
In wired equivalent privacy (WEP), the shared secret key is combined with an initialization vector (IV). The IV and the key are combined and used as a seed for generating a random number necessary in the encryption process. The IV and encrypted ciphertext are both transmitted to the receiving device. Upon arrival, the receiving device first separates the IV from the encrypted text and then combines the IV with its shared secret key to decrypt the data
Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate the IoT device?
Subscriber identity module
A SIM card is an integrated circuit that securely stores information used to identify and
authenticate the IoT device on a cellular network like 5G. Some IoT devices use a SIM card (subscriber identity module card) for data transmission
Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves?
Dedicated probe
A dedicated probe is designed to exclusively monitor for RF transmissions. Dedicated probes only monitor the airwaves