Lecture 2a Flashcards

(44 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What technology does Bluetooth use for communication?

A

Short-range radio frequency RF transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary Bluetooth network topology called?

A

Piconet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Bluetooth

A

who controls all wireless traffic in a piconet?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluejacking?

A

An attack sending unwanted messages to Bluetooth-enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is Bluejacking harmful or annoying?

A

More annoying than harmful because no data is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluesnarfing?

A

An attack accessing unauthorized information from a Bluetooth device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens during Bluesnarfing?

A

Attacker copies emails contacts or other data without owner knowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Near Field Communication NFC?

A

A set of standards for communication between devices in close proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At what distance do NFC devices establish communication?

A

Within 4 centimeters or by tapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a passive NFC device?

A

Contains information that can be read but does not transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an active NFC device?

A

Can read and transmit information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three examples of NFC use.

A

Automobile Entertainment Retail stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RFID commonly used for?

A

Transmitting information between badges inventory tags and other proximity tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Do RFID tags require their own power supply?

A

No most RFID tags are passive and do not have a power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name one RFID attack type.

A

Unauthorized tag access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What can happen in an unauthorized tag access attack?

A

Rogue reader determines inventory on store shelf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a fake tag attack in RFID?

A

Replacing authentic tags with fake ones containing false data

19
Q

What can eavesdropping on RFID communications lead to?

A

Leak of confidential data like purchase history to rivals

20
Q

What is a WLAN?

A

A wireless local area network designed to replace or supplement wired LAN

21
Q

What organization sets WLAN standards?

A

Institute of Electrical and Electronics Engineers IEEE

22
Q

When was the IEEE 802.11 standard first released?

23
Q

What Wi-Fi version corresponds to IEEE 802.11n?

24
Q

What device acts as a base station and bridge in a WLAN?

A

Access Point AP

25
What is a rogue access point?
An unauthorized AP set up to bypass network security
26
What is an evil twin attack?
An attacker sets up a fake AP mimicking a legitimate AP
27
What is RF jamming in WLAN attacks?
Intentional interference flooding the radio frequency spectrum to block communication
28
What does MAC address filtering do?
Permits or blocks devices based on their MAC addresses
29
What is a weakness of MAC address filtering?
MAC addresses are exchanged unencrypted and can be spoofed
30
What protocol replaced WEP for wireless security?
Wi-Fi Protected Access WPA
31
What are the two modes of WPA?
WPA Personal and WPA Enterprise
32
What encryption protocol does WPA2 use?
AES-CCMP
33
What standard provides port-based authentication in WPA2 Enterprise?
IEEE 802.1x
34
What does EAP stand for?
Extensible Authentication Protocol
35
Name two common EAP packet types.
Request and Response
36
What technologies relate to specialized wireless communications?
Zigbee 5G Narrowband IoT Cellular IoT SIM card
37
What is a key vulnerability of WEP?
Short initialization vector makes it easy to break
38
What is Wi-Fi Protected Setup WPS?
An optional way to configure WLAN security using PIN or push-button
39
What flaw exists in WPS PIN method?
No lockout limit and separate validation of PIN halves
40
What is the function of an access point in WLAN?
To send and receive wireless signals and bridge to wired network
41
What happens during a spoofing attack in WLAN?
Attacker sends frames pretending to come from a trusted client
42
What is the impact of an attacker intercepting WLAN data?
They may gain significant information about the wired network
43
Why are home wireless networks often vulnerable?
Users often fail to configure any security
44
What are two main security goals of WPA2?
Encryption and authentication