Wireless CNO Flashcards

(22 cards)

1
Q

analysts source & survey as much intel as possible from all available databases and sources

A

Initial Intel Dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Target nomination; Collect as able to maintain tgt awareness, but no action at this time

A

Continue Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Target nomination; Active & Passive operations to gain access to tgt information systems

A

Conduct CNE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Target nomination; DISRUPTING, DENYING, DEGRADING target systems and their ability to communicate result in a denial of service that will disrupt future collection efforts, and may alert the target that they are being targeted

A

Conduct CNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Target nomination; final part of the Find/Fix/Finish picture. POL efforts must be used to ensure time/location when units conduct kill/capture

A

Kill/Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Places attacker in the flow of communications with the ability to view, modify, or drop frames in real-time

A

man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fake Wi-Fi network that looks like a legitimate access point to steal victims sensitive details;
Attackers can initiate a DEAUTHENTICATION to get victims to associate with the new rogue AP;
KARMA is the took kit to do this & only works on unencrypted networks

A

Rogue AP-Evil Twin Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

creation of Internet Protocol (IP) packets which have a modified source address to hide sender or impersonate another computer system;
Technique to invoke DDoS attacks against a target device or surrounding infra

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the final part of the Find/Fix/Finish picture?

A

Kill/Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an analyst’s responsibilities?

A

where, when, what, identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

linking an attackers MAC address with the IP address of a legitimate user on a local area network using fake ARP messages;
User data is sent transmitted to attacker

A

ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

infiltrating a DNS server and altering a websites address record;
users attempting to access the site are sent by the altered DNS record to the attackers site

A

DNS Spoofing/DNS cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DENY, DEGRADE, DISRUPT, or DESTROY a targets ability to transmit data on a network

A

Computer Network Attack CNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

limit or totally block the availability of network resources;
affects stations other than the intended targets

A

denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

exploits the RTS/CTS protocol in 802.11 by either sending spoofed CTS frames OR an sending repeated RTS frames to an AP forcing the AP to send CTS commands;
Affects all devices operating on channel, and networks within the RF range

A

CTS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

pushes deauthentication frames as broadcast or unicast to cause clients to attempt to re-authenticate/reassociate with their AP

A

Deauthentication attack

17
Q

intentional use of RF energy to deny or degrade wireless communication

18
Q

unintentional degrading of a frequency by devices that emit RF energy within a given frequency

19
Q

conducted in support of a Kill/Capture Operation;
Good analytics + geolocating a device

A

Find/fix operations

20
Q

identifies the direction from which it is receiving the most RF energy from a signal on a frequency;
LOBs (no distance associated)

A

antenna array

21
Q

use algorithms to compute a location of the emitter, usually expressed in 10 digit MGRS;
include Time of arrival, time difference of arrival, and/or frequency difference of arrival with the geolocation systems GPS coordinates & clock as a reference point

22
Q

What type of an attack exploits the RTS/CTS protocol in 802.11?