Wireless Concept Flashcards

1
Q

Which type of antenna is used in wireless communication

A

Omnidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

antennas radiate electromagnetic energy in all directions

A

Omnidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

method of digital modulation of data in which a signal, at a chosen frequency, is split into multiple carrier frequencies that are orthogonal (occurring at right angles) to each other

A

Orthogonal Frequency-division Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Influences the spectral efficiency of 4G and 5G wireless communication services. Technique reduces the interference and increases how robust the channel is.

A

Multiple input, multiple output-orthogonal frequency-division multiplexing (MIMO-OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code. Also referred to as a data transmission scheme or modulation scheme, the technique protects signals against interference or jamming.

A

Direct-sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmitting radio signals by rapidly switching a carrier among many frequency channels

A

Frequency-hopping Spread Spectrum (FHSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Antennas can achieve very long-distance Wi-Fi transmissions by using a highly focused radio beam. This type of antenna is useful for transmitting weak radio signals over very long distances – on the order of 10 miles

A

A parabolic grid antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

centralized authentication and authorization management system

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

proprietary version of EAP developed by Cisco

A

LEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is an encryption protocol used in WPA2 for stronger encryption and authentication

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

availability attacks

A

Beacon Flood, Denial-of-Service, Routing Attacks, Authenticate Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Generating thousands of counterfeit 802.11 beacons to make it hard for clients to find a legitimate AP.

A

Beacon Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exploiting the CSMA/CA Clear Channel Assessment (CCA) mechanism to make a channel appear busy.

A

Denial-of-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distributing routing information within the network.

A

Routing Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sending forged authenticates or associates from random MACs to fill a target AP’s association table.

A

Authenticate Flood

17
Q

proof of concept code for a Bluetooth wardriving utility. It is useful for finding hidden and discoverable Bluetooth devices.

A

BlueSniff

18
Q

an attack in which an attacker gains remote access to a target Bluetooth-enabled device without the victim being aware of it. In this attack, an attacker sniffs sensitive information and might perform malicious activities such as intercepting phone calls and messages, forwarding calls and text messages, etc.

A

Bluebugging

19
Q

Foot printing technique performed by an attacker in order to determine the make and model of the target Bluetooth-enabled device. Attackers collect this information to identify model, manufacturer, etc. and analyze them in an attempt to find out whether the devices are in the range of vulnerability to exploit.

A

BluePrinting

20
Q

Attack is a passive attack in which attackers spoof the MAC address of the target Bluetooth-enabled device, in order to intercept or manipulate the data sent towards the target device.

A

MAC Spoofing Attack

21
Q

Blackjack Attack

A

BBProxy

22
Q

Re-purposed access points that do only packet capturing and analysis (RF sensors) are plugged in all over the wired network to detect and warn the WLAN administrator about any wireless devices operating in the area.

A

RF Scanning

23
Q

Network management software uses this technique to detect rogue APs. This software detects devices connected in the LAN, including Telnet, SNMP, CDP (Cisco discovery protocol) using multiple protocols.

A

Wired Side Inputs

24
Q

Access points that have the functionality of detecting neighboring APs operating in the nearby area will expose the data through its MIBS and web interface.

A

AP Scanning

25
Q

A Virtual Private Network (VPN) is a network that provides secure access to the private network through the internet. VPNs are used for connecting wide area networks (WAN). It allows computers on one network to connect to computers on another network.

A

Virtual-Private-Network

26
Q

It is a technique used to provide wireless security by hiding the SSID and network name from public broadcasting. Use SSID cloaking to keep certain default wireless messages from broadcasting the ID to everyone.

A

SSID Cloaking

27
Q

use of Bluetooth to send messages to users without the recipient’s consent, similar to email spamming.

A

Bluejacking

28
Q

Attack occurs when an attacker sends an oversized ping packet to a victim’s device, causing a buffer overflow

A

Bluesmacking

29
Q

a passive attack in which attackers spoof the MAC address of the target Bluetooth-enabled device, in order to intercept or manipulate the data sent towards the target device.

A

MAC Spoofing