Security Challanges Flashcards

(15 cards)

1
Q

What fundamental security challenge exists with wireless networks?

A

Wireless signals are publicly broadcast and can be intercepted by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can interception of wireless signals be mitigated?

A

Encrypt data in transit using strong encryption protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does non-repudiation mean in wireless networks?

A

Ensuring the data received is from a known, trusted sender, and verifying the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can data integrity be compromised in wireless networks?

A

Through interception and manipulation via Man-in-the-Middle (MITM) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a solution for achieving non-repudiation?

A

Using certificates and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characteristics make an encryption key effective?

A

Long, randomized, short lifespan, difficult to guess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is hiding the SSID beneficial?

A

Reduces visibility of the network to casual attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the risk of using DHCP on wireless networks?

A

Susceptibility to unauthorized IP assignment and spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a VPN enhance wireless security?

A

Encrypts all traffic end-to-end, protecting data even on insecure public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why should you regularly update firmware on wireless devices?

A

To patch vulnerabilities and maintain strong security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What additional security measure is useful in preventing unauthorized access?

A

MAC address filtering to restrict device connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol significantly improved upon WPA2 vulnerabilities?

A

WPA3 with advanced handshake methods and forward secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is forward secrecy in WPA3?

A

Ensuring captured data cannot be decrypted even if keys are compromised later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why might attackers prefer active sniffing?

A

To directly interact with and exploit target systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main drawback of WEP encryption?

A

Static keys and weak IV make it highly susceptible to various attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly