Ch.9 Flashcards

1
Q

an attack that sends unsolicited messages to Bluetooth-enabled devices

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an attack that accesses unauthorized information from a wireless device through Bluetooth connection

A

bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an infrastructure that is used on public access WLANs to provide a higher degree of security

A

captive portal AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP)

A

Challenge-Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user’s device will unknowingly connect to this evil twin instead of the authorized AP

A

evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a framework for transporting authentication protocols that defines the format of the messages

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a 24-bit value used in WEP that changes each time a packet is encrypted

A

initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software

A

Lightweight EAP (LEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a method for controlling access to a WLAN based on the device’s MAC address

A

Media Access Control (MAC) address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity

A

near field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP)

A

Password Authentication Protocol (PAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating

A

preshared key (PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

an EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords

A

Protected EAP (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring

A

RF jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the alphanumeric user-supplied network name of a WLAN

A

service set identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an in-depth examination and analysis of a wireless LAN site

A

site survey

20
Q

the WPA and WPA2 encryption technology

A

temporal key integrity protocol (TKIP)

21
Q

the process of documenting and then advertising the location of wireless LANs for others to use

A

war chalking

22
Q

the original set of protections from the Wi-Fi Alliance designed to address both encryption and authentication

A

Wi-Fi Protected Access (WPA)

23
Q

The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security

A

Wi-Fi Protected Access 2 (WPA2)

24
Q

an optional means of configuring security on wireless local area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs. Due to design and implementation flaws, WPS is not considered secure

A

Wi-Fi Protected Setup (WPS)

25
Q

an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure

A

Wired Equivalent Privacy (WEP)

26
Q

a wireless network designed to replace or supplement a wired local area network (LAN)

A

wireless local area network (WLAN)

27
Q

a passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker’s presence being detected

A

wireless replay

28
Q

Which technology is predominately used for contactless payment systems?

a. wireless local area network (WLAN)
b. Bluetooth
c. near field communication (NFC)
d. Temporal Key Integrity Protocol (TKIP)

A

C

29
Q

Blue tooth falls under the category of _________.

a. local area network (LAN)
b. short area network (SAN)
c. paired-device network (PDN)
d. personal area network (PAN)

A

D

30
Q

Which of these IEEE WLANs has the highest data rate?

a. 802.11b
b. 802.11n
c. 802.11g
d. 802.11ac

A

D

31
Q

Which of these technologies is NOT found in a wireless broadband router?

a. wireless probe
b. firewall
c. router
d. access point

A

A

32
Q

Why is a rogue AP a security vulnerability?

a. It uses the weaker IEEE 802.15.ax protocol
b. It allows an attacker to bypass many of the network security configurations
c. It requires the use of vulnerable wireless probes on all mobile devices
d. It conflicts with other network firewalls and can cause them to become disabled

A

B

33
Q

Which of these is NOT a risk when a home wireless router is not securely configured?

a. An attacker can steal data from any folder with file sharing enabled
b. Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker
c. Only 50 percent of the packets will be encrypted
d. Malware can be injected into a computer connected to the WLAN

A

C

34
Q

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

a. PIN method
b. push-button method
c. pconet method
d. NFC method

A

A

35
Q

If Cora tries to access a free public Wi-Fi at a local coffee shop that requires her to first agree to an Acceptable Use Policy (AUP) before continuing, what type of AP has she encountered?

a. web-based
b. captive portal
c. rogue
d. Internet content filter

A

B

36
Q

What is the unauthorized access of information from a wireless device through a Bluetooth connection called?

a. bluejacking
b. bluesnarfing
c. Bluetooth snatching
d. Bluetooth spoofing

A

B

37
Q

The primary design of a(n)_______ is to capture the transmissions from legitimate users.

a. rogue access point
b. WEP
c. evil twin
d. Bluetooth grabber

A

C

38
Q

Which of these is a vulnerability of MAC address filtering?

a. The user must enter the MAC
b. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.
c. APs use IP addresses instead of MACs
d. Not all operating systems support MACs

A

B

39
Q

Which of these is NOT a limitation of turning off the SSID broadcast from an AP?

a. Users can more easily roam from one WLAN to another.
b. the SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.
c. Turning off the SSID broadcast may prevent users from being able to freely roam form one AP coverage area to another
d. Some versions of operating systems favor a network that broadcasts an SSID over one that does not.

A

A

40
Q

What is the primary weakness of wired equivalent privacy (WEP)?

a. it functions only on specific brands APs
b. its usage creates a detectable pattern
c. it slows down a WLAN from 104 Mbps to 16 Mbps
d. initialization vectors (IVs) are difficult for users to manage

A

B

41
Q

WPA replaces WEP with _______.

a. WPA2
b. Temporal Key Integrity Protocol (TKIP)
c. Cyclic Redundancy Check (CRC)
d. Message Integrity Check (MIC)

A

A

42
Q

A Preshared Key (PSK) of fewer than ______ characters may be subject to an attack if that key is a common dictionary word.

a. 20
b. 32
c. 48
d. 64

A

A

43
Q

A WEP key that is 128 bits in length _______.

a. has an initialization vector (IV) that is the same length as a WEP key of 64 bits
b. cannot be cracked because it is too long
c. cannot be used on access points that use passphrases
d. is less secure than a WEP key of 64 bits because shorter keys are stronger

A

C

44
Q

AES-CCMP is the encryption protocol standard used in __________.

a. bluetooth
b. WPA2
c. IEEE 802.11
d. WPA

A

B

45
Q

What is the Extensible Authentication Protocol (EAP)?

a. framework for transporting authentication protocols
b. a subset of WPA2
c. the protocol used in TCP/IP for authentication
d. a technology used by IEEE 802.11 for encryption

A

A

46
Q

Which technology should be used instead of LEAP?

a. STREAK
b. PEAP
c. LEAP-2
d. REAP

A

B

47
Q

Which of these is NOT a type of wireless AP probe?

a. wireless device probe
b. WNIC PROBE
c. dedicated probe
d. AP probe

A

B