Wireless Attacks and Countermeasures Flashcards
Which of the following terms describes the amount of information broadcast over a connection and is measured in terms of “number of bits per seconds (bps)”?
Bandwidth: It describes the amount of information that may be broadcast over a connection. Usually, bandwidth refers to the data transfer rate and is measured in bits (amount of data) per second (bps).
Which of the following components of a wireless network is used to connect wireless devices to a wireless/wired network and serves as a switch between a wired LAN and wireless network?
Access point (AP): An AP is used to connect wireless devices to a wireless/wired network. It allows wireless communication devices to connect to a wireless network through wireless standards such as Bluetooth and Wi-Fi. It serves as a switch or hub between a wired LAN and wireless network.
Smith, a network administrator, was instructed to enhance wireless security and implement a centralized authentication mechanism for clients. To achieve this, Smith implemented a wireless encryption technology that uses EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates.
Which of the following technology has Smith implemented in the above scenario?
WPA2-Enterprise: WPA2-Enterprise uses EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates. WPA-Enterprise assigns a unique ciphered key to every system and hides it from the user in order to provide additional security and to prevent the sharing of keys. Users are allocated login credentials by a centralized server, which they must present when connecting to the network.
Cedrick, a security professional, implemented stronger encryption and authentication for protecting his organization’s network from wireless attacks. He utilized an encryption technique that uses TKIP for data encryption and eliminates the weaknesses of WEP by including per-packet mixing functions, MICs, extended IVs, and re-keying mechanisms.
Identify the encryption technique employed by Cedrick in the above scenario.
Wi-Fi Protected Access (WPA) Encryption: WPA is an example of how 802.11i provides stronger encryption and enables pre-shared key (PSK) or EAP authentication. WPA uses TKIP for data encryption, which eliminates the weaknesses of WEP by including per-packet mixing functions, MICs, extended IVs and re-keying mechanisms.
In which of the following attacks does an attacker create a soft AP, typically on a laptop, by running a tool that makes the laptop’s NIC appear as a legitimate AP?
Unauthorized association
Which of the following Bluetooth mode rejects connection requests sent by any device in the vicinity?
Non-pairable mode
Which of the following practices should be followed while configuring a wireless network to defend against potential wireless attacks?
Enable MAC address filtering on APs or routers
Which of the following communication standards is also known as WiMAX and is designed to provide multiple physical layers (PHY) and MAC options?
802.16 - The IEEE 802.16 standard is a wireless communications standard that provides multiple physical layers (PHY) and MAC options. It is also known as WiMax. This standard is a specification for fixed broadband wireless metropolitan access networks (MANs) that use a point-to-multipoint architecture.
Which of the following devices does an attacker use to overload traffic to prevent authorized users from accessing a wireless network and block the communication in a
certain radius?
Jamming device - An attacker can jam a wireless network using a Wi-Fi jammer. This device uses the same frequency band as a trusted network. It causes interference to legitimate signals and temporarily disrupts the network service.
Which of the following attacks does an attacker use to breach the security mechanism of a paired Bluetooth device for eavesdropping on the data being carried by short-distance communication protocols?
KNOB attack “Key Negotiation of Bluetooth” a KNOB attack allows a hacker to funnel data streaming between Bluetooth-connected devices – whether it be the music you are listening to on your wireless headphones, or the words you type on a Bluetooth-enabled keyboard. Perhaps more disturbingly, a KNOB attacker can “pair” with a user’s device without the user’s knowledge or permission, if within range of the targeted device.