1500 Flashcards
(100 cards)
The encryption protocol standard for WPA2.
AES-CCMP
An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings.
Bluetooth
An AP set up by an attacker to mimic an authorized AP and capture transmissions - so a user’s device will unknowingly connect to this evil twin instead.
Evil Twin
A framework for transporting authentication protocols that defines the format of the messages.
Extensible Authentication Protocol (EAP)
A 24-bit value used in WEP that changes each time a packet is encrypted.
Initialization Vector (IV)
A method of determining the keystream by analyzing two packets that were created from the same initialization vector (IV).
Keystream Attack (IV Attack)
A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software.
Lightweight EAP (LEAP)
A method for controlling access to a WLAN based on the device’s MAC address.
Media Access Control (MAC) Address Filtering
A key value that must be created and entered into both the access point and all wireless devices (“shared”) prior to (“pre”) the devices communicating with the AP.
Preshared Key (PSK)
An EAP method designed to simplify the deployment of 802.11x by using Microsoft Windows logins and passwords.
Protected EAP (PEAP)
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its user to attacks.
Rogue Access Point
The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters.
Service Set Identifier (SSID)
The transmission of the SSID from the access point to wireless devices.
SSID Broadcast
A WPA encryption technology.
Temporal Key Integrity Protocol (TKIP)
The process of documenting and then advertising the location of wireless LANs for others to use. Wireless networks were identified by drawing on sidewalks or walls around the area of the network.
War Chalking
Searching for wireless signals from an automobile or on foot suing a portable computing device.
War Driving
The original set of protections from the Wi-Fi Alliance in 2003 designed to protect both present and future wireless devices.
Wi-Fi Protected Access (WPA)
The second generation of WPA security from the Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs.
Wi-Fi Protected Access 2 (WPA2)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
Wired Equivalent Privacy (WEP)
Bluetooth falls under the category of __________. A. local area network (LAN) B. short area network (SAN) C. paired-device network (PDN) D. personal area network (PAN)
D. personal area network (PAN)
A Bluetooth network that contains one master and at least one slave using the same RF channel forms a __________. A. cluster B. grouping C. scatteringnet D. piconet
D. piconet
____________ is the unauthorized access of information from a wireless device through a Bluetooth connection. A. Bluejacking B. Bluetooth snatching C. Bluetooth spoofing D. Bluesnarfing
D. bluesnarfing