Chapter 5 Flashcards

1
Q

802.11a

A

provides wireless LAN bandwidth of up to 54 Mbps at 5GHz frequency
169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11b

A

bandwidths up to 11Mbps at 2.4GHz frequency

169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11g

A

bandwidths up to 54Mbps at 2.4 GHz frequency

170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11i

A

provides for security enhancements to the wireless standard with particular focus on authentication. The standard is often referenced as WPA2, the name given to it by the Wi-Fi Alliance
170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11n

A

bandwidths up to 600 Mbps (theoretical) can operate at either 5Ghz or 2.4 GHz
170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluesnarfing

A

Gaining of unauthorized access through a Bluetooth connection. Can be accessed through a smartphone. Allows hackers to copy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Site survey

A

determines what types of systems are in use, the protocols used, and other critical info about your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

War Driving

A

Driving around town with a laptop in promiscuous mode looking for open WAPs
185

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

War Chalking

A

Once someone discovers an open network, they will leave signals in the real world so other people can hack into the system
185

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LEAP

A

Lightweight Extensible Authentication Protocol

Created by Cisco as a quick fix to WEP’s incompetencies
Still considered a weak solution to the problem
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PEAP

A

Protected Extensible Authentication Protocol

Replaced LEAP. Supports all Windows operating systems since XP. Establishes an encrypted channel between server and client
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPS

A

Wifi Protected Setup

Usually requires the user to do something (often physical) to complete the enrollment process
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPS Attacks

A

Brute Force attacks used to guess a user’s PIN. Once they guess it you’re screwed
182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NFC

A

Near Field Communication

Requires a user to bring the client close to the AP in order to verify that the device is present. Like bumping phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol

Framework for authentication that is often used with wireless networks
181

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of EAP

A
EAP-TLS
EAP-PSK
EAP-MDS
LEAP
PEAP
181
17
Q

Captive Portal

A

Requires users to agree to some condition before they use the network or Internet. They must agree on some condition
180

18
Q

Antenna Types

A

Omnidirectional - signal all direction
Directional - Focuses signal in one direction. It can often reach farther
178

19
Q

Gain Value

A

Way of rating an antenna expressed in dBi

20
Q

Network Lock

A

Another way of saying MAC filtering

21
Q

WAP security level

Anonymous Authentication

A

Allows anyone to connect to a portal

22
Q

WAP security level

Server Authentication

A

Requires the workstation to authenticate against the server

23
Q

WAP security level

Two-way Authentication

A

Requires both the client and the server to authenticate the mobile system’s network

24
Q

WSP

A

Wireless Session Protocol

manages the session information and connection between the devices
175

25
WTP
Wireless Transaction Protocol provides similar services to TCP/UDP for WAP 175
26
WTLS
Wireless Transport Layer Security The security layer of WAP 175
27
WDP
provides the common interface between devices | 175
28
WTLS
Wireless Transport Layer Security Security layer of WAP. Provides authentication, encryption, and data integrity 173
29
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol uses 128-bit AES with 48-bit initialization vector. Increases difficulty of cracking and minimizes risk of replay attack 172