Wireless Network Threats Flashcards

1
Q

An IV attack is usually associated with which of the following wireless protocols?

WEP

WAP

WPA

A

WEP

An IV attack is usually associated with the WEP wireless protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the size of the initialization vector (IV) that WEP uses for encryption?

6-bit

24-bit

56-bit

A

24-bit

The initialization vector (IV) that WEP uses for encryption is 24-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on things such as the MAC address of your machine and the serial number of the packet?

128-bit

64-bit

56-bit

A

128-bit

TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on things such as the MAC address of the host device and the serial number of the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technology is used to send data between phones that are in close proximity to each other?

NFC

IBI

IBJ

A

NFC

Near Field Communication (NFC) is used to send data between phones that are in close proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technology is used to simplify network setup by allowing a router to have the administrator push a button on it to allow a new host to join?

WEP

WPA

WPS

A

WPS

WPS (Wi-Fi Protected Setup) is intended to simplify network setup for home and small offices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following technologies is used to identify and track tags attached to objects?

NFC

RFID

IV

A

RFID

RFID (Radio Frequency Identification) technology is used to identify and track tags attached to objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack captures portions of a session to play back later to convince a host that it is still talking to the original connection?

Replay

Echo

Duplication

A

Replay

A replay attack captures portions of a session to play back later to convince a host that it is still talking to the original connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which standard defines port-based security for wireless network access control?

  1. 1n
  2. 1g
  3. 1x
A

802.1x

The 802.1x standard defines port-based security for wireless network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of attacks involves the sending of unsolicited messages over a Bluetooth connection?

Bluesmurfing

Bluewhaling

Bluejacking

A

Bluejacking

Bluejacking is the sending of unsolicited messages over a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Karl has checked into a hotel after a long day of travel. He is attempting to check his daily deluge of email messages using the free in-room Wi-Fi, but it keeps losing the connection. When he calls the front desk, they suggest that he might want to use the premium Wi-Fi (which costs more) to get a better connection. What type of attack could this scenario represent?

Upselling

Cross-selling

Disassociation

A

Disassociation

With a disassociation attack, the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Frustrated with the low signal that the devices in his cubicle receive, Spencer brings in his own access point and creates his own network. Kristin, a co-worker, tells him that if the boss finds out about this it is grounds for immediate dismissal, and he should read the employee handbook if he has any questions. Setting up your own access point represents which of the following?

Degenerate

Rogue

Corporeal

A

Rogue

A rogue access point is any unauthorized wireless access point on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

During the authentication part of setting up his small office access point, Wolfgang was required to enter a PIN within 60 seconds. This process is known as:

Wired Equivalent Privacy

Wi-Fi Protected Access

Wi-Fi Protected Setup

A

Wi-Fi Protected Setup

An authentication process that requires the user to do something in order to complete the enrollment process is known as Wi-Fi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network?

WEP

WEB

WELL

A

WEP

Wired Equivalent Privacy (WEP) is a security protocol for 802.11b (wireless) networks that attempts to establish the same security for them as would be present in a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Evan fears that the tenant in the office next door is using RF interference to try to force his small company to vacate the building in frustration. Purposely obstructing or interfering with a signal is known as which of the following?

Shoving

Jamming

Cramming

A

Jamming

Jamming is purposely obstructing or interfering with a signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a disassociation attack more commonly known as?

Decertification attack

Disconfirmation attack

Deauthentication attack

A

Deauthentication attack

A disassociation attack is commonly referred to as a deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

With near field communication (NFC) technology, the industry tends to use what distance as “near”?

1 inch

  1. 2 inches
  2. 6 inches
A

1.6 inches

While there is no hard-coded standard defining “near,” the industry tends to use 4cm (1.6 inches) as the distance

17
Q

With Bluetooth devices suddenly popping up everywhere in your network, you want to secure as many of them as possible. One of the simplest methods of securing these devices is not to set their attribute to:

Discoverable

Transmit

Announce

A

Discoverable

One of the simplest ways to secure Bluetooth devices is not to set their attribute to Discoverable

18
Q

Which of the following is the gaining of unauthorized access through a Bluetooth connection?

Bluejumping

Bluesnarfing

Bluerunning

A

Bluesnarfing

Bluesnarfing is the gaining of unauthorized access through a Bluetooth connection

19
Q

A client calls you and says that he wants to turn off the SSID broadcast on his small network because he is afraid that those simply scanning for a network are finding it and trying to connect to it. You inform him that this is a very weak form of security and suggest some other options, but he is insistent on this being done. What is this form of hiding the router known as?

Masking

Shrouding

Cloaking

A

Cloaking

Cloaking is a method of protecting the network that involves turning off the SSID broadcast. The access point is still there and accessible by those who know of its existence, but it prevents those who are just scanning from finding it

20
Q

Which of the following is attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Collision

Evil twin

NFC

A

Evil twin

In an evil twin attack, a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit