Wireless Network Threats Flashcards

1
Q

802.1x

A

The IEEE standard that defines port-based security for wireless network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluejacking

A

The sending of unsolicited messages over a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing

A

The gaining of unauthorized access through a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disassociation

A

An attack where the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evil twin

A

An attack where a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Interference

A

The byproduct of electrical processes

i.e. static on the radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IV attack

A

An attack that involves looking at repeated results in order to crack the WEP secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jamming

A

Purposely obstructing or interfering with a signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Near field communication (NFC)

A

Technology that enables communication between devices when they’re “touched” together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NFC

A

near field communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Radio frequency identification (RFID)

A

A technology that uses electromagnetic coupling in the radio frequency (RF) portion of the spectrum to identify items uniquely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RFID

A

radio frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Replay attack

A

An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rogue access point

A

An unauthorized wireless access point on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Service Set Identifier (SSID)

A

Used by the access point of a wireless LAN to identify itself; intended to be unique for a particular entity on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSID

A

Service Set Identifier

17
Q

Wi-Fi

A

A wireless network operating in the 2.4 GHz or 5 GHz range

18
Q

Wi-Fi Protected Setup (WPS)

A

An authentication process that requires the user to do something in order to complete the enrollment process.

Ex: pressing a button on the router within a short period of time

19
Q

WPS

A

Wi-Fi Protected Setup

20
Q

Wired Equivalent Privacy (WEP)

A

A security protocol for 802.11b (wireless) networks that attempts to establish the same security as would be present in a wired network

21
Q

WEP

A

Wired Equivalent Protocol

22
Q

Wireless access point

A

A connection device user for clients in a radio frequency (RF) network