Wifi Security Flashcards

1
Q

What is the Physical Layer?

A

Sending bits through a medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the datalink layer?

A

Point-to-point communications between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the MAC (medium access control) sub-layer?

A

Responsible for broadcasting. Moving packets from one node to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is WEP (wired equivalent privacy)?

A

A security protocol used to secure wireless computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does WEP work?

A

WEP operates by encrypting the data transmitted over the wireless network to protect from eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the encryption process of WEP?

A

The encryption process uses a shared key known as the WEP key to encode data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the weakness of WEP?

A

Is can be easily cracked, due to the weak key generation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the solution to WEP?

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does WPA encrypt information?

A

It uses a more robust encryption algorithm called TKIP, which dynamically generates keys for each data packet, making it more secure than keys used by WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What key management does WPA use?

A

4 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is WPA authentication compared to WEP?

A

WPA has a much strong authentication mechanism. It supports a variety of authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WEP provide?

A

Authentication
Confidentiality
Integrity Checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does WEP not provide?

A
  • Key management
  • No protection against replay attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a replay attack?

A

When an attacker eavesdrops on a conversation, intercepts it and then delays or resends the message to misdirect the reciever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the approaches for WEP authentication?

A
  • Open system authentication
  • Shared key authentication
  • Authentication using SSID of AP
  • MAC address filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does WPA offer?

A
  • Key management
  • Authentication
  • Confidentiality
  • Integrity checking
  • Protection against relay attacks
17
Q

What are the three layers of WPA?

A
  • Supplicant
  • Authenticator
  • Authentication Server