Wireless Attacks and Countermeasures Flashcards

1
Q

Which of the following terms describes the amount of information broadcast over a connection and is measured in terms of “number of bits per seconds (bps)”?

A

Bandwidth: It describes the amount of information that may be broadcast over a connection. Usually, bandwidth refers to the data transfer rate and is measured in bits (amount of data) per second (bps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following components of a wireless network is used to connect wireless devices to a wireless/wired network and serves as a switch between a wired LAN and wireless network?

A

Access point (AP): An AP is used to connect wireless devices to a wireless/wired network. It allows wireless communication devices to connect to a wireless network through wireless standards such as Bluetooth and Wi-Fi. It serves as a switch or hub between a wired LAN and wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smith, a network administrator, was instructed to enhance wireless security and implement a centralized authentication mechanism for clients. To achieve this, Smith implemented a wireless encryption technology that uses EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates.

Which of the following technology has Smith implemented in the above scenario?

A

WPA2-Enterprise: WPA2-Enterprise uses EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates. WPA-Enterprise assigns a unique ciphered key to every system and hides it from the user in order to provide additional security and to prevent the sharing of keys. Users are allocated login credentials by a centralized server, which they must present when connecting to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cedrick, a security professional, implemented stronger encryption and authentication for protecting his organization’s network from wireless attacks. He utilized an encryption technique that uses TKIP for data encryption and eliminates the weaknesses of WEP by including per-packet mixing functions, MICs, extended IVs, and re-keying mechanisms.

Identify the encryption technique employed by Cedrick in the above scenario.

A

Wi-Fi Protected Access (WPA) Encryption: WPA is an example of how 802.11i provides stronger encryption and enables pre-shared key (PSK) or EAP authentication. WPA uses TKIP for data encryption, which eliminates the weaknesses of WEP by including per-packet mixing functions, MICs, extended IVs and re-keying mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which of the following attacks does an attacker create a soft AP, typically on a laptop, by running a tool that makes the laptop’s NIC appear as a legitimate AP?

A

Unauthorized association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following Bluetooth mode rejects connection requests sent by any device in the vicinity?

A

Non-pairable mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following practices should be followed while configuring a wireless network to defend against potential wireless attacks?

A

Enable MAC address filtering on APs or routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following communication standards is also known as WiMAX and is designed to provide multiple physical layers (PHY) and MAC options?

A

802.16 - The IEEE 802.16 standard is a wireless communications standard that provides multiple physical layers (PHY) and MAC options. It is also known as WiMax. This standard is a specification for fixed broadband wireless metropolitan access networks (MANs) that use a point-to-multipoint architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following devices does an attacker use to overload traffic to prevent authorized users from accessing a wireless network and block the communication in a
certain radius?

A

Jamming device - An attacker can jam a wireless network using a Wi-Fi jammer. This device uses the same frequency band as a trusted network. It causes interference to legitimate signals and temporarily disrupts the network service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following attacks does an attacker use to breach the security mechanism of a paired Bluetooth device for eavesdropping on the data being carried by short-distance communication protocols?

A

KNOB attack “Key Negotiation of Bluetooth” a KNOB attack allows a hacker to funnel data streaming between Bluetooth-connected devices – whether it be the music you are listening to on your wireless headphones, or the words you type on a Bluetooth-enabled keyboard. Perhaps more disturbingly, a KNOB attacker can “pair” with a user’s device without the user’s knowledge or permission, if within range of the targeted device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly