Module 16 - Hacking Wireless Networks Flashcards
Wireless Concepts:
- a 32 alphanumeric character unique identifier given to wireless local area network (WLAN).
- Wireless network name
a. BSSID
b. GSM
c. Access Point
d. SSID (Service Set Identifier)
d. SSID (Service Set Identifier)
Wireless Concepts:
Which wireless standard can use both the 2.4 and 5 Ghz range and provide speed up to 600 Mbps?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16
d. 802.11n
Wireless Concepts:
Which wireless standard uses the 2.4 Ghz range and provides speeds up to 11 Mbps?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16
b. 802.11b
Wireless Concepts:
Which standard is used for Bluetooth?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16
e. 802.15
Wireless Concepts:
Which wireless standard uses the 5 Ghz range and provides speeds up to 54 Mbps?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16
a. 802.11a
Wireless Concepts:
If your entire city is using wireless then you are using what wireless standard?
Also known as WiMAX.
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16
f. 802.16
Wireless Concepts:
Which wireless standard uses the 2.4 Ghz range and provides speeds up to 54 Mbps?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16
c. 802.11g
Wireless Concepts:
- Is a unidirectional antenna commonly used in communications for a frequency bacd of 10 MHz to VHF and UHF.
a. Directional Antenna
b. Omnidirectional Antenna
c. Parabolic Grid Antenna
d. Yagi Antenna
e. Dipole Antenna
f. Reflector Antenna
d. Yagi Antenna
Wireless Concepts:
It provides a 360 degree horizontal radiation pattern. It is used in wireless base stations.
a. Directional Antenna
b. Omnidirectional Antenna
c. Parabolic Grid Antenna
d. Yagi Antenna
e. Dipole Antenna
f. Reflector Antenna
b. Omnidirectional Antenna
Wireless Encryption:
- Uses a 24-bit initialization vector (IV) to form stream cipher RC4 for confidentiality.
- It was first cracked in 2007
- Should not be used
a. WEP
b. WPA
c. WPA2
d. RADIUS
e. EAP
a. WEP
Wireless Encryption:
- It is an advanced wireless encryption protocol using a Temporal Key Integrity Protocol (TKIP) that utilizes the RC4 stream cipher encryption.
a. WEP
b. WPA
c. WPA2
d. RADIUS
e. EAP
b. WPA
Wireless Encryption:
It is an upgrade to WPA using AES and CCMP for wireless data encryption.
a. WEP
b. WPA
c. WPA2
d. RADIUS
e. EAP
c. WPA2
Wireless Encryption:
If you are using 802.11i, what wireless encryption is being used?
a. WEP
b. WPA
c. WPA2
d. RADIUS
e. EAP
c. WPA2
Wireless Encryption:
What is WPA2 that is not using a RADIUS server is called?
WPA2-Personal
Wireless Encryption:
What is WPA2 that is using a RADIUS server is called?
WPA2-Enterprise
Wireless Hacking Methodology:
A Method used to draw symbols in public places to advertise open Wi-Fi networks.
a. WarFlying
b. WarChalking
c. WarDriving
d. WarWalking
b. WarChalking
Wireless Hacking Methodology:
Attackers drive around with Wi-Fi enabled laptops to detect open wireless networks.
a. WarFlying
b. WarChalking
c. WarDriving
d. WarWalking
c. WarDriving
Wireless Hacking Methodology:
Attackers use drones to detect open wireless netowrks.
a. WarFlying
b. WarChalking
c. WarDriving
d. WarWalking
a. WarFlying
Wireless Hacking Methodology:
Is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2 cracker and analysis tool for 802.11 wireless networks. This program runs under Linux and Windows.
a. Airdriver-ng
b. Aircrack-ng
c. Easside-ng
d. Airbase-ng
e. Wesside-ng
b. Aircrack-ng
___________ is a short-range wireless communication technology that replaces the cables connecting portable or fixed devices while maintaining high levels of security.
Bluetooth
Bluetooth Hacking:
DoS attack which overflows Bluetooth-enabled devices with random packets causing the device to crash.
a. Bluejacking
b. Blue Snarfing
c. Bluebugging
d. BluePrinting
e. Bluesmacking
e. Bluesmacking
Bluetooth Hacking:
The art of sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, laptops, etc.
a. Bluejacking
b. Blue Snarfing
c. Bluebugging
d. BluePrinting
e. Bluesmacking
a. Bluejacking
Bluetooth Hacking:
The theft of information from a wireless device through a Bluetooth connection.
a. Bluejacking
b. Blue Snarfing
c. Bluebugging
d. BluePrinting
e. Bluesmacking
b. Blue Snarfing
Bluetooth Hacking:
Is the activity of sending anonymous messages over Bluetooth to Bluetooth-enabled devices such as laptops, mobile phones, etc.
-Pairing
Bluejacking
Wireless Security Tools:
Protect networks against wireless threats, and enable administrators to detect and prevent various network attacks.
a. WIPS
b. HIPS
c. NIDS
d. IDS
a. WIPS