wireless security Flashcards

1
Q

war driving

A

People drive around looking for unsecured LANs so they can get free internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

warchalking

A

once an open WLAN is found in a public place, a user writes a symbol on a wall to notify others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WEP & WPA security cracking

A

utilities can capture wireless packets and run mathematical algorithms to determine the pre-shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

rouge access point

A

a malicious user set up his own AP to which legitimate users would connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC address filtering

A

configures an AP with a listing of permitted MAC addresses. Unfortunately, it is possible for hackers to falsify their MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

disabling SSID broadcast (aka cloaking)

A

configures the AP to not broadcast the name of the wireless LAN. Hackers can still find the SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

pre-shared key

A

both the AP & wireless client need the same key. can lead to scalability problems in large networks if the key is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IEEE 802.1X

A

wired or wireless users authenticate with their own credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WEP

A

Wired equivalent privacy. Original 802.11 wireless security standard. static 40-bit WEP key - AP & client use same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA

A

wi-fi protected access. Developed to address issues with WEP. Uses TKIP & MIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA2

A

uses counter mode with cipher block chaining message authentication code protocol (CCMP) & AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TKIP

A

temporal key integrity protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MIC

A

message integrity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOHO security checklist

A

no default setting, virus protection/firewall/disable file sharing, cell sizing (adjust power setting to limit coverage where needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOHO 2 security checklist

A

cloaking, MAC filter, static IP, encryption, turn off when not needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly