Wireless Security Flashcards

(20 cards)

1
Q

What was the first wireless security protocol?

A

Wired Equivalent Privacy (WEP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is WEP insecure?

A

Uses a static key, short IV (24-bit), and weak encryption (RC4) prone to various attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some attacks against WEP.

A

FMS Attack, KoreK Attack, ChopChop Attack, Fragmentation Attack, PTW Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What encryption protocol replaced WEP?

A

Wi-Fi Protected Access (WPA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What improvements does WPA have over WEP?

A

Uses TKIP, provides dynamic keying, better integrity checks, and improved security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the vulnerabilities of WPA?

A

Susceptible to dictionary and brute-force attacks due to PSKs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What encryption standard is used by WPA2?

A

Advanced Encryption Standard (AES) with CCMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What vulnerabilities were discovered in WPA2?

A

KRACK attacks (Key Reinstallation AttaCKs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main improvements in WPA3?

A

Protection against offline dictionary attacks, forward secrecy, easier connection methods like Wi-Fi Easy Connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Dragonfly handshake in WPA3?

A

A key exchange resistant to active/passive attacks and offline dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a downgrade attack in WPA3 transitional mode?

A

Forcing WPA3 devices to revert to the less secure WPA2 handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WPA Enterprise use for authentication?

A

802.1X, often combined with RADIUS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary function of a RADIUS server?

A

Authentication, Authorization, and Accounting (AAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is MAC address filtering?

A

Allowing network access only to devices with specific MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an SSID cloak?

A

Hiding the wireless network name from being broadcast publicly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What security measure encrypts connections at both ends over public networks?

A

Virtual Private Network (VPN).

17
Q

What tool can be used as a rogue access point for testing?

A

Wi-Fi Pineapple.

18
Q

What is DHCP and why can it be insecure?

A

Dynamic Host Configuration Protocol; it dynamically assigns IP addresses, which can be exploited.

19
Q

Why use static IP addresses for security?

A

Reduces vulnerability by eliminating DHCP attacks.

20
Q

What should you regularly update on a wireless access point to maintain security?

A

Firmware and software patches.