Wireless Security Flashcards

1
Q

authentication framework frequently used in wireless networks and point-to-point connections. Many authentication methods can be used with it

A

EAP (Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

client-side and server-side certificates for authentication. Offers the highest level of security of all the EAP methods

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

designed to strengthen WEP without replacing legacy hardware

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-based encryption mode implemented in WPA2

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

gaining unauthorized access to a Bluetooth device

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sending unsolicited messages over Bluetooth

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attack designed to exploit the vulnerabilities of WEP

A

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

least susceptible to wireless replay attacks

A

WPA2-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication methods that can be used with EAP

A

PEAP, EAP-FAST, EAP-TLS, EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly