Wireless Network Threat Terms (Ch. 5) Flashcards

1
Q

The IEEE standard that defines port-based security for wireless network access control.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The sending of unsolicited messages over a Bluetooth connection.

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The gaining of unauthorized access through a Bluetooth connection.

A

bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.

A

disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.

A

evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The byproduct of electrical processes where a stronger signal causes changes in a weaker signal

A

interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack that involves looking at repeated results in order to crack the WEP secret key.

A

IV Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purposely obstructing or interfering with a signal.

A

jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technology that enables communication between

devices when they’re “touched” together. Often used to verify (often through RFID or Wi-Fi) that the device is present.

A

near field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technology that incorporates the use of elec-
tromagnetic coupling in the radio frequency (RF) portion of the spectrum to identify items uniquely (object, animal, person, credit cards, door access tokens, antishoplifting devices, and so on).

A

Radio Frequency Identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection.

A

replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An unauthorized wireless access point on a network.

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network.

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security protocol for 802.11b (wireless) networks that

attempts to establish the same security for them as would be present in a wired network.

A

Wired Equivalent Privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A connection device used for clients in a radio frequency (RF) network.

A

wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly