Wireless CNO PE Flashcards

1
Q

What CNE attack places the attacker in the flow of traffic with the ability to view, Modify, or drop frames in real-time?

A

MitM ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What exploit/attack includes a Rogue Access Point?

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This attack type involves and attacker disguising themselves as an application by altering packet headers in an IP address. As a result, users attempting to access a URL connected to the application are sent to the attackers website.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is the process of linking attackers MAC address with the IP address of a legitimate user on a Local Area Network using fake ARP messages. As a result, data sent by the user to the host IP address is instead transmitted to the attacker.

A

ARP SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This attack involves infiltrating a DNS server and altering a website’s address record. As a result, users attempting to access the site are sent by the altered DNS record to the attackers site. ALSO, this is attack is also referred to as what?

A

DNS cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When assigned or searching for a new target, analysts will source as much intel as possible from all available databases and sources. This is called:

A

Initial Intel Dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This attack affects the stations other than the intended targets, and limits or totally blocks the availability of network resources.

A

DoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This attack sends spoofed CTS frames or sends repeated RTS frames to an AP forcing the AP to send CTS commands.

A

CTS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This attack causes a client to have to reauthenticate/reassociate with their AP.

A

Deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The intentional use of RF energy to deny or degrade wireless communications.

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The intentional use of RF energy to deny or degrade wireless communications.

A

Fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many LOBs (Line of Bearing) are needed to produce an effective fix?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is considered much more accurate than a DF, and uses algorithms to produce an MGRS?

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Jamming is associated with the unintentional degradation of wireless communication efforts.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When an analyst is provided with a new target, what surveys should the analyst begin with

  • 5GHz band and all associated channels
  • MAC addresses, IP addresses, SSIDs, encryptions and channels
  • 2.4GHz band and all associated channels
  • All of the Above
A

All of the Above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool is commonly and widely used to perform packet capture?

A

Wireshark

17
Q

Target nomination will depend on criteria defined for each mission provided by :

A

The analyst’s unit

18
Q

An attacker can initiate a(n) _______________ to get victims to associate with the new rogue AP.

A

Deauthentication

19
Q

CNA operations are designed to DENY, DEGRADE, DISRUPT, or __________ a targets ability to transmit data on a network.

A

DESTROY

20
Q

Active & Passive operations to gain access to target information systems is called :

A

Conduct CNE

21
Q

What is the final part of the Find/Fix/Finish picture. where POL efforts must be used to ensure time/location?

A

Kill/Capture

22
Q

What is target collecting as able to maintain target awareness, but no action is taken at this time.

A

Continue Collection

23
Q

Must be careful when conducting this activity, since disruption, denial, or degradation of target systems and their ability to communicate result in a DoS that will disrupt future collection efforts.

A

Kill/Capture