Wireless Network Threats Flashcards
An IV attack is usually associated with which of the following wireless protocols?
WEP
WAP
WPA
WEP
An IV attack is usually associated with the WEP wireless protocol
What is the size of the initialization vector (IV) that WEP uses for encryption?
6-bit
24-bit
56-bit
24-bit
The initialization vector (IV) that WEP uses for encryption is 24-bit
What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on things such as the MAC address of your machine and the serial number of the packet?
128-bit
64-bit
56-bit
128-bit
TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on things such as the MAC address of the host device and the serial number of the packet
What technology is used to send data between phones that are in close proximity to each other?
NFC
IBI
IBJ
NFC
Near Field Communication (NFC) is used to send data between phones that are in close proximity
What technology is used to simplify network setup by allowing a router to have the administrator push a button on it to allow a new host to join?
WEP
WPA
WPS
WPS
WPS (Wi-Fi Protected Setup) is intended to simplify network setup for home and small offices
Which of the following technologies is used to identify and track tags attached to objects?
NFC
RFID
IV
RFID
RFID (Radio Frequency Identification) technology is used to identify and track tags attached to objects
What type of attack captures portions of a session to play back later to convince a host that it is still talking to the original connection?
Replay
Echo
Duplication
Replay
A replay attack captures portions of a session to play back later to convince a host that it is still talking to the original connection
Which standard defines port-based security for wireless network access control?
- 1n
- 1g
- 1x
802.1x
The 802.1x standard defines port-based security for wireless network access control
Which of the following types of attacks involves the sending of unsolicited messages over a Bluetooth connection?
Bluesmurfing
Bluewhaling
Bluejacking
Bluejacking
Bluejacking is the sending of unsolicited messages over a Bluetooth connection
Karl has checked into a hotel after a long day of travel. He is attempting to check his daily deluge of email messages using the free in-room Wi-Fi, but it keeps losing the connection. When he calls the front desk, they suggest that he might want to use the premium Wi-Fi (which costs more) to get a better connection. What type of attack could this scenario represent?
Upselling
Cross-selling
Disassociation
Disassociation
With a disassociation attack, the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network
Frustrated with the low signal that the devices in his cubicle receive, Spencer brings in his own access point and creates his own network. Kristin, a co-worker, tells him that if the boss finds out about this it is grounds for immediate dismissal, and he should read the employee handbook if he has any questions. Setting up your own access point represents which of the following?
Degenerate
Rogue
Corporeal
Rogue
A rogue access point is any unauthorized wireless access point on a network
During the authentication part of setting up his small office access point, Wolfgang was required to enter a PIN within 60 seconds. This process is known as:
Wired Equivalent Privacy
Wi-Fi Protected Access
Wi-Fi Protected Setup
Wi-Fi Protected Setup
An authentication process that requires the user to do something in order to complete the enrollment process is known as Wi-Fi Protected Setup (WPS)
Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network?
WEP
WEB
WELL
WEP
Wired Equivalent Privacy (WEP) is a security protocol for 802.11b (wireless) networks that attempts to establish the same security for them as would be present in a wired network
Evan fears that the tenant in the office next door is using RF interference to try to force his small company to vacate the building in frustration. Purposely obstructing or interfering with a signal is known as which of the following?
Shoving
Jamming
Cramming
Jamming
Jamming is purposely obstructing or interfering with a signal
What is a disassociation attack more commonly known as?
Decertification attack
Disconfirmation attack
Deauthentication attack
Deauthentication attack
A disassociation attack is commonly referred to as a deauthentication attack