Wireless Flashcards

1
Q

When assigned or searching for a new target, analysts will source as much intel as possible from all available databases and sources

A

Initial Intel Dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

determined by the criteria for each particular mission but is narrowed down to one of the following

A

Target nomination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collect as able to maintain target awareness

A

Continue Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active & Passive operations to gain access

A

Conduct CNE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disruptive attacks that can alert the target

A

Conduct CNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

inal part of the Find/Fix/Finish picture. POL efforts must be used to ensure time/location when units conduct

A

Kill/Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Places attacker in the flow of communications with the ability to view, modify, or drop frames in real-time

A

MitM Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a tool kit that allows attackers to set up rogue APs by monitoring for Probe Requests, a KARMA-based rogue AP replies back immediately.

A

KARMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Involves an attacker disguising himself as an application by altering packet headers in an IP address.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

process of linking an attackers MAC address with the IP address of a legitimate user on a local area network using fake ARP messages.

A

ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

also known as DNS cache poisoning, involves infiltrating a DNS server and altering a websites address record.

A

DNS Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

designed to DENY, DEGRADE, DISRUPT, or DESTROY a targets ability to transmit data on a network.

A

CNA operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

aims to limit or totally block the availability of network resources.

A

denial of service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

exploits the RTS/CTS protocol in 802.11 by either sending spoofed CTS frames OR an sending repeated RTS frames to an AP forcing the AP to send CTS commands.

A

CTS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

pushes deauthentication frames as broadcast or unicast to cause clients to attempt to re-authenticate/re-associate with their AP.

A

Deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

intentional use of RF energy to deny or degrade wireless communication.

A

Jamming

17
Q

Taking multiple LOBs from different directions/angles creates a what’s known as a

A

fix

18
Q

far more accurate and better refined than DF LOBs and Fixes alone.

use algorithms to compute a location of the emitter, usually expressed in 10 digit MGRS.

A

Geo-location