Chapter 5: Protecting Wireless Networks Flashcards

1
Q

802.11

A

1-2 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11a

A

54 Mbps

5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11b

A

11 Mbps

2.4 GHz

Wi-Fi!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11g

A

54 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11i

A

Provides for security enhancements, often referred to as WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11n

A

Under the right conditions 600 Mbps, but realistically less

Can operate in both 2.4 GHz and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IV Attack

A

Attackers cracking the WEP initialization vector by examining its repeats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Temporal Key Integrity Protocol (TKIP)

A

Placed a 128-bit wrapper around the WEP encryption with a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Markup Language (WML)

A

A smaller version of HTML used by WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gap in the WAP

A

The security concern that exists when converting between WAP (Wireless Application Protocol) and SSL/TLS and exposing plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA Features

A
  • RC4 with TKIP

- Compatible with older devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPA2 Features

A
  • CCMP

- Not compatible with older devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A

128-bit AES encryption with a 48 bit initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Application Protocol (WAP)

A

A data transmission standard that is meant to be like TCP/IP for wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless TLS

A
  • Provides authentication, encryption, and data integrity for wireless devices.
  • Supports wireless devices that don’t have extremely powerful processors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless Session Protocol (WSP)

A

Manages the session info and connection between the devices

17
Q

Wireless Transaction Protocol (WTP)

A

Provides services similar to TCP and UDP for WAP

18
Q

Wireless Datagram Protocol (WDP)

A

Provides the common interface between devices

19
Q

Transceiver

A

Transmitter/receiver, AKA a wireless access point

20
Q

What portion of the RF spectrum do wireless technologies use?

21
Q

All antennas are rated in terms of _______.

A

Gain value

22
Q

Captive Portal

A

Requires users to agree to some condition before they use the network.

23
Q

Extensible Authentication Protocol (EAP)

A

Provides a framework for authentication that is often used with wireless networks

24
Q

Wi-Fi Protected Setup (WPS)

A

EAP message(s) that require some sort of authentication to join the network

25
Lightweight EAP (LEAP)
Requires mutual authentication, but is susceptible to dictionary attacks
26
Protected EAP (PEAP)
Replacement of LEAP that establishes an encrypted channel between server and client
27
Cloaking
Turning off the SSID broadcast on a WAP
28
Rogue Access Point
An access point added to your network that has not been authorized
29
Evil Twin
A rogue access point that poses as a legit access point
30
Bluejacking
Sending of unsolicited messages (spam) over a Bluetooth connection
31
Bluesnarfing
Gaining unauthorized access through a bluetooth connection