Chapter 5 Flashcards

1
Q

802.11a

A

provides wireless LAN bandwidth of up to 54 Mbps at 5GHz frequency
169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11b

A

bandwidths up to 11Mbps at 2.4GHz frequency

169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11g

A

bandwidths up to 54Mbps at 2.4 GHz frequency

170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11i

A

provides for security enhancements to the wireless standard with particular focus on authentication. The standard is often referenced as WPA2, the name given to it by the Wi-Fi Alliance
170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11n

A

bandwidths up to 600 Mbps (theoretical) can operate at either 5Ghz or 2.4 GHz
170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluesnarfing

A

Gaining of unauthorized access through a Bluetooth connection. Can be accessed through a smartphone. Allows hackers to copy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Site survey

A

determines what types of systems are in use, the protocols used, and other critical info about your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

War Driving

A

Driving around town with a laptop in promiscuous mode looking for open WAPs
185

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

War Chalking

A

Once someone discovers an open network, they will leave signals in the real world so other people can hack into the system
185

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LEAP

A

Lightweight Extensible Authentication Protocol

Created by Cisco as a quick fix to WEP’s incompetencies
Still considered a weak solution to the problem
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PEAP

A

Protected Extensible Authentication Protocol

Replaced LEAP. Supports all Windows operating systems since XP. Establishes an encrypted channel between server and client
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPS

A

Wifi Protected Setup

Usually requires the user to do something (often physical) to complete the enrollment process
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPS Attacks

A

Brute Force attacks used to guess a user’s PIN. Once they guess it you’re screwed
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NFC

A

Near Field Communication

Requires a user to bring the client close to the AP in order to verify that the device is present. Like bumping phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol

Framework for authentication that is often used with wireless networks
181

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of EAP

A
EAP-TLS
EAP-PSK
EAP-MDS
LEAP
PEAP
181
17
Q

Captive Portal

A

Requires users to agree to some condition before they use the network or Internet. They must agree on some condition
180

18
Q

Antenna Types

A

Omnidirectional - signal all direction
Directional - Focuses signal in one direction. It can often reach farther
178

19
Q

Gain Value

A

Way of rating an antenna expressed in dBi

20
Q

Network Lock

A

Another way of saying MAC filtering

21
Q

WAP security level

Anonymous Authentication

A

Allows anyone to connect to a portal

22
Q

WAP security level

Server Authentication

A

Requires the workstation to authenticate against the server

23
Q

WAP security level

Two-way Authentication

A

Requires both the client and the server to authenticate the mobile system’s network

24
Q

WSP

A

Wireless Session Protocol

manages the session information and connection between the devices
175

25
Q

WTP

A

Wireless Transaction Protocol

provides similar services to TCP/UDP for WAP
175

26
Q

WTLS

A

Wireless Transport Layer Security

The security layer of WAP
175

27
Q

WDP

A

provides the common interface between devices

175

28
Q

WTLS

A

Wireless Transport Layer Security

Security layer of WAP. Provides authentication, encryption, and data integrity
173

29
Q

CCMP

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

uses 128-bit AES with 48-bit initialization vector. Increases difficulty of cracking and minimizes risk of replay attack
172