Exam Review Flashcards

(36 cards)

1
Q

What is a Private Branch Exchange (PBX)?

A

A private telephone network used within an organization allowing internal communication and external calling through shared telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compare 802.11 Wi-Fi operating on 2.4 GHz vs. 5 GHz.

A

2.4 GHz has longer range, greater penetration, fewer non-overlapping channels; 5 GHz has shorter range, less interference, more non-overlapping channels, higher speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a packet analyzer and how is it used?

A

Software/hardware tool capturing, analyzing network traffic for troubleshooting, security monitoring, detecting attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two types of wireless ad-hoc networks.

A

Standard Ad-hoc mode (peer-to-peer) and Wi-Fi Direct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Briefly describe MAC address spoofing.

A

Changing a device’s hardware MAC address to impersonate another authorized device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of Wi-Fi frames?

A

Management frames, Control frames, Data frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List five features/benefits of Wi-Fi 6 (802.11ax).

A

Higher throughput, better efficiency (OFDMA), improved battery life, better performance in crowded environments, supports MU-MIMO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Briefly explain SSLStrip.

A

An attack technique downgrading HTTPS connections to HTTP to intercept secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Nonce, ANonce, and SNonce.

A

Nonce: A number used once; ANonce: authenticator nonce in WPA handshake; SNonce: supplicant nonce in WPA handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the two message exchanges in the Dragonfly Key Exchange.

A

Commit message and Confirm message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the WPA four-way handshake.

A

Process of establishing secure session between client and AP using four message exchanges to confirm identities and generate encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the DragonBlood vulnerability?

A

Vulnerabilities affecting WPA3’s Dragonfly handshake allowing attackers to perform downgrade, side-channel, and denial-of-service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of information can be found in 802.11 Frame Fields?

A

MAC addresses, SSID, BSSID, security settings, signal strength, channel information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name three WLAN topologies.

A

Infrastructure, Ad-hoc, Wi-Fi Direct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List three differences between WPA2 and WPA3.

A

WPA3 provides forward secrecy, protection against offline dictionary attacks, and uses Dragonfly handshake instead of WPA2’s PSK handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Briefly explain UDP and its uses.

A

User Datagram Protocol, connectionless transport protocol providing speed over reliability, used in streaming, gaming, DNS queries.

17
Q

What are two primary functions of a RADIUS server?

A

Authentication and Authorization (third function: Accounting).

18
Q

What Wi-Fi forensic evidence can be obtained from mobile devices?

A

SSID history, MAC addresses, timestamps, connection types, authentication methods.

19
Q

Describe the two Wi-Fi scanning modes.

A

Active (transmitting probes and listening for responses), Passive (listening to beacon frames without transmitting).

20
Q

What vulnerabilities are associated with WPA2?

A

KRACK (Key Reinstallation Attacks) enabling attackers to decrypt Wi-Fi packets.

21
Q

Explain Wi-Fi Easy Connect.

A

Simplified, secure way to connect devices to Wi-Fi using QR codes or NFC tags without passwords.

22
Q

What forensic value does a PBX system provide?

A

PBX systems can contain call logs, voicemail data, extension routing, and time-stamped call metadata useful in fraud or misuse investigations.

23
Q

What Wi-Fi forensic evidence can be obtained from a suspect’s cellular telephone?

A

SSID history, MAC addresses, timestamps, authentication types, and connection events.

24
Q

What does the Herrevad database reveal in a forensic investigation?

A

Time-stamped records of network access, including SSID, BSSID, carrier codes, and cell tower IDs.

25
What file on Android contains Wi-Fi configurations and keys?
wpa_supplicant.conf
26
What kind of data can iOS store regarding Wi-Fi networks?
SSID, MAC address of AP, last joined time, authentication type, stored in com.apple.wifi.plist
27
What forensic value does a PBX system provide?
PBX systems can contain call logs, voicemail data, extension routing, and time-stamped call metadata useful in fraud or misuse investigations.
28
What Wi-Fi forensic evidence can be obtained from a suspect’s cellular telephone?
SSID history, MAC addresses, timestamps, authentication types, and connection events.
29
What does the Herrevad database reveal in a forensic investigation?
Time-stamped records of network access, including SSID, BSSID, carrier codes, and cell tower IDs.
30
What file on Android contains Wi-Fi configurations and keys?
wpa_supplicant.conf
31
What kind of data can iOS store regarding Wi-Fi networks?
SSID, MAC address of AP, last joined time, authentication type, stored in com.apple.wifi.plist
32
What forensic value does a PBX system provide?
PBX systems can contain call logs, voicemail data, extension routing, and time-stamped call metadata useful in fraud or misuse investigations.
33
What Wi-Fi forensic evidence can be obtained from a suspect’s cellular telephone?
SSID history, MAC addresses, timestamps, authentication types, and connection events.
34
What does the Herrevad database reveal in a forensic investigation?
Time-stamped records of network access, including SSID, BSSID, carrier codes, and cell tower IDs.
35
What file on Android contains Wi-Fi configurations and keys?
wpa_supplicant.conf
36
What kind of data can iOS store regarding Wi-Fi networks?
SSID, MAC address of AP, last joined time, authentication type, stored in com.apple.wifi.plist