Deck 2: Wireless LAN Vulnerabilities

Full screen (f)
exit full mode
Question
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A) social engineering
B) brute force
C) dictionary
D) birthday
Use Space or
up arrow
down arrow
to flip the card.
Question
In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
Question
The SSID can be easily discovered even when it is not contained in beacon frames.
Question
At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.

A) association request frame
B) CRC
C) ICV
D) beacon frame
Question
Deploying dynamic WEP is a very expensive solution that involves a lot of effort.
Question
A stream cipher takes one character and replaces it with another character. This output is known as the ____.

A) initialization vector
B) integrity check value
C) cyclic redundancy check
D) keystream
Question
With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.

A) active
B) passive
C) interactive
D) moving
Question
Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A) confidentiality
B) integrity
C) availability
D) non-repudiation
Question
In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.

A) social engineering
B) brute force
C) dictionary
D) birthday
Question
____ requires the wireless device (and not the user) to be authenticated prior to being connected to the network.

A) SSID
B) Wireless authentication
C) Wired confidentiality
D) Wireless availability
Question
WEP relies on a secret key shared between a wireless client device and the access point.
Question
In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

A) public key cryptography
B) asymmetric encryption
C) asymmetric cryptography
D) private key cryptography
Question
To encrypt packets WEP can use only a 64-bit or ____-bit number.

A) 72
B) 90
C) 110
D) 128
Question
Changing the original text to a secret message using cryptography is known as ____.

A) ciphertext
B) decryption
C) encryption
D) plaintext
Question
Access control is intended to guard the ____ of information by making it accessible only to authorized users.

A) confidentiality
B) availability
C) integrity
D) non-repudiation
Question
When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.
Question
The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.

A) SSID broadcast
B) handoff
C) roaming
D) scanning
Question
In WEP, the ____ is a cyclic redundancy check (CRC) value calculated with a checksum based on the contents of the text.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
Question
Wireless access control through MAC address filtering is the same as access restrictions.
Question
A(n) ____ carries information about the data rates that a device can support along with the Service Set Identifier (SSID) of the network it wants to join.

A) association request frame
B) CRC
C) PRNG
D) ICV
Question
Describe the main characteristics of the shared key authentication method.
Question
What are some of the tools used to perform WEP attacks?
Question
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
Question
What is a MAC address?
Question
Describe the main characteristics of the open system authentication method.
Question
Briefly explain how WEP implementation violates the cardinal rule of cryptography: anything that creates a detectable pattern must be avoided.
Question
A(n) ____________________ acts as the central base station for the wireless network.
Question
In WEP, RC4 uses a(n) ____________________ to create the keystream.
Question
____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

A) Kerberos
B) Dynamic WEP
C) WEP2
D) LDAP
Question
The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.
Question
____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.

A) WEP2
B) Dynamic WEP
C) SSID
D) Roaming
Question
Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.
Question
WEP2 uses a different authentication system known as ____.

A) RADIUS
B) MS-CHAPS
C) LDAP
D) Kerberos
Question
Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).

A) collision
B) keystream
C) ICV
D) CRC vector
Question
What are the options for creating keys in WEP?
Question
What was the criteria used by the IEEE 802.11 committee to design WEP?
Question
____ traffic is traffic sent to all users on the network.

A) Unicast
B) Broadcast
C) Singlecast
D) Multicast
Question
____ traffic is traffic destined for only one address.

A) Severalcast
B) Multicast
C) Unicast
D) Broadcast
Question
A wireless device is set to look for beacon frames from the AP. This is known as ____________________.
Question
What are the differences between Dynamic WEP unicast and broadcast keys?
Question
What are the main characteristics of Kerberos?
Question
Match between columns
adds two new security enhancements to WEP.
SSID
adds two new security enhancements to WEP.
RC4
adds two new security enhancements to WEP.
Cipher
adds two new security enhancements to WEP.
AirSnort
adds two new security enhancements to WEP.
Access restrictions
adds two new security enhancements to WEP.
Shoulder surfing
adds two new security enhancements to WEP.
WEP2
adds two new security enhancements to WEP.
Keystream attack
adds two new security enhancements to WEP.
Access control
the "network name" for the wireless network.
SSID
the "network name" for the wireless network.
RC4
the "network name" for the wireless network.
Cipher
the "network name" for the wireless network.
AirSnort
the "network name" for the wireless network.
Access restrictions
the "network name" for the wireless network.
Shoulder surfing
the "network name" for the wireless network.
WEP2
the "network name" for the wireless network.
Keystream attack
the "network name" for the wireless network.
Access control
an encryption algorithm.
SSID
an encryption algorithm.
RC4
an encryption algorithm.
Cipher
an encryption algorithm.
AirSnort
an encryption algorithm.
Access restrictions
an encryption algorithm.
Shoulder surfing
an encryption algorithm.
WEP2
an encryption algorithm.
Keystream attack
an encryption algorithm.
Access control
stream cipher that accepts keys up to 128 bits in length.
SSID
stream cipher that accepts keys up to 128 bits in length.
RC4
stream cipher that accepts keys up to 128 bits in length.
Cipher
stream cipher that accepts keys up to 128 bits in length.
AirSnort
stream cipher that accepts keys up to 128 bits in length.
Access restrictions
stream cipher that accepts keys up to 128 bits in length.
Shoulder surfing
stream cipher that accepts keys up to 128 bits in length.
WEP2
stream cipher that accepts keys up to 128 bits in length.
Keystream attack
stream cipher that accepts keys up to 128 bits in length.
Access control
can limit a user's access to the Internet.
SSID
can limit a user's access to the Internet.
RC4
can limit a user's access to the Internet.
Cipher
can limit a user's access to the Internet.
AirSnort
can limit a user's access to the Internet.
Access restrictions
can limit a user's access to the Internet.
Shoulder surfing
can limit a user's access to the Internet.
WEP2
can limit a user's access to the Internet.
Keystream attack
can limit a user's access to the Internet.
Access control
tool to perform WEP attacks.
SSID
tool to perform WEP attacks.
RC4
tool to perform WEP attacks.
Cipher
tool to perform WEP attacks.
AirSnort
tool to perform WEP attacks.
Access restrictions
tool to perform WEP attacks.
Shoulder surfing
tool to perform WEP attacks.
WEP2
tool to perform WEP attacks.
Keystream attack
tool to perform WEP attacks.
Access control
looking over someone's shoulder.
SSID
looking over someone's shoulder.
RC4
looking over someone's shoulder.
Cipher
looking over someone's shoulder.
AirSnort
looking over someone's shoulder.
Access restrictions
looking over someone's shoulder.
Shoulder surfing
looking over someone's shoulder.
WEP2
looking over someone's shoulder.
Keystream attack
looking over someone's shoulder.
Access control
method of determining the keystream by analyzing two packets that were created from the same IV.
SSID
method of determining the keystream by analyzing two packets that were created from the same IV.
RC4
method of determining the keystream by analyzing two packets that were created from the same IV.
Cipher
method of determining the keystream by analyzing two packets that were created from the same IV.
AirSnort
method of determining the keystream by analyzing two packets that were created from the same IV.
Access restrictions
method of determining the keystream by analyzing two packets that were created from the same IV.
Shoulder surfing
method of determining the keystream by analyzing two packets that were created from the same IV.
WEP2
method of determining the keystream by analyzing two packets that were created from the same IV.
Keystream attack
method of determining the keystream by analyzing two packets that were created from the same IV.
Access control
method of restricting access to resources.
SSID
method of restricting access to resources.
RC4
method of restricting access to resources.
Cipher
method of restricting access to resources.
AirSnort
method of restricting access to resources.
Access restrictions
method of restricting access to resources.
Shoulder surfing
method of restricting access to resources.
WEP2
method of restricting access to resources.
Keystream attack
method of restricting access to resources.
Access control
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Wireless LAN Vulnerabilities
1
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A) social engineering
B) brute force
C) dictionary
D) birthday
C
2
In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
A
3
The SSID can be easily discovered even when it is not contained in beacon frames.
True
4
At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.

A) association request frame
B) CRC
C) ICV
D) beacon frame
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Deploying dynamic WEP is a very expensive solution that involves a lot of effort.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A stream cipher takes one character and replaces it with another character. This output is known as the ____.

A) initialization vector
B) integrity check value
C) cyclic redundancy check
D) keystream
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.

A) active
B) passive
C) interactive
D) moving
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A) confidentiality
B) integrity
C) availability
D) non-repudiation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.

A) social engineering
B) brute force
C) dictionary
D) birthday
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ requires the wireless device (and not the user) to be authenticated prior to being connected to the network.

A) SSID
B) Wireless authentication
C) Wired confidentiality
D) Wireless availability
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
WEP relies on a secret key shared between a wireless client device and the access point.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

A) public key cryptography
B) asymmetric encryption
C) asymmetric cryptography
D) private key cryptography
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
To encrypt packets WEP can use only a 64-bit or ____-bit number.

A) 72
B) 90
C) 110
D) 128
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Changing the original text to a secret message using cryptography is known as ____.

A) ciphertext
B) decryption
C) encryption
D) plaintext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Access control is intended to guard the ____ of information by making it accessible only to authorized users.

A) confidentiality
B) availability
C) integrity
D) non-repudiation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.

A) SSID broadcast
B) handoff
C) roaming
D) scanning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In WEP, the ____ is a cyclic redundancy check (CRC) value calculated with a checksum based on the contents of the text.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Wireless access control through MAC address filtering is the same as access restrictions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) ____ carries information about the data rates that a device can support along with the Service Set Identifier (SSID) of the network it wants to join.

A) association request frame
B) CRC
C) PRNG
D) ICV
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the main characteristics of the shared key authentication method.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
What are some of the tools used to perform WEP attacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What is a MAC address?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Describe the main characteristics of the open system authentication method.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly explain how WEP implementation violates the cardinal rule of cryptography: anything that creates a detectable pattern must be avoided.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____________________ acts as the central base station for the wireless network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
In WEP, RC4 uses a(n) ____________________ to create the keystream.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

A) Kerberos
B) Dynamic WEP
C) WEP2
D) LDAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.

A) WEP2
B) Dynamic WEP
C) SSID
D) Roaming
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
WEP2 uses a different authentication system known as ____.

A) RADIUS
B) MS-CHAPS
C) LDAP
D) Kerberos
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).

A) collision
B) keystream
C) ICV
D) CRC vector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the options for creating keys in WEP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What was the criteria used by the IEEE 802.11 committee to design WEP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____ traffic is traffic sent to all users on the network.

A) Unicast
B) Broadcast
C) Singlecast
D) Multicast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ traffic is traffic destined for only one address.

A) Severalcast
B) Multicast
C) Unicast
D) Broadcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A wireless device is set to look for beacon frames from the AP. This is known as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the differences between Dynamic WEP unicast and broadcast keys?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the main characteristics of Kerberos?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
adds two new security enhancements to WEP.
SSID
adds two new security enhancements to WEP.
RC4
adds two new security enhancements to WEP.
Cipher
adds two new security enhancements to WEP.
AirSnort
adds two new security enhancements to WEP.
Access restrictions
adds two new security enhancements to WEP.
Shoulder surfing
adds two new security enhancements to WEP.
WEP2
adds two new security enhancements to WEP.
Keystream attack
adds two new security enhancements to WEP.
Access control
the "network name" for the wireless network.
SSID
the "network name" for the wireless network.
RC4
the "network name" for the wireless network.
Cipher
the "network name" for the wireless network.
AirSnort
the "network name" for the wireless network.
Access restrictions
the "network name" for the wireless network.
Shoulder surfing
the "network name" for the wireless network.
WEP2
the "network name" for the wireless network.
Keystream attack
the "network name" for the wireless network.
Access control
an encryption algorithm.
SSID
an encryption algorithm.
RC4
an encryption algorithm.
Cipher
an encryption algorithm.
AirSnort
an encryption algorithm.
Access restrictions
an encryption algorithm.
Shoulder surfing
an encryption algorithm.
WEP2
an encryption algorithm.
Keystream attack
an encryption algorithm.
Access control
stream cipher that accepts keys up to 128 bits in length.
SSID
stream cipher that accepts keys up to 128 bits in length.
RC4
stream cipher that accepts keys up to 128 bits in length.
Cipher
stream cipher that accepts keys up to 128 bits in length.
AirSnort
stream cipher that accepts keys up to 128 bits in length.
Access restrictions
stream cipher that accepts keys up to 128 bits in length.
Shoulder surfing
stream cipher that accepts keys up to 128 bits in length.
WEP2
stream cipher that accepts keys up to 128 bits in length.
Keystream attack
stream cipher that accepts keys up to 128 bits in length.
Access control
can limit a user's access to the Internet.
SSID
can limit a user's access to the Internet.
RC4
can limit a user's access to the Internet.
Cipher
can limit a user's access to the Internet.
AirSnort
can limit a user's access to the Internet.
Access restrictions
can limit a user's access to the Internet.
Shoulder surfing
can limit a user's access to the Internet.
WEP2
can limit a user's access to the Internet.
Keystream attack
can limit a user's access to the Internet.
Access control
tool to perform WEP attacks.
SSID
tool to perform WEP attacks.
RC4
tool to perform WEP attacks.
Cipher
tool to perform WEP attacks.
AirSnort
tool to perform WEP attacks.
Access restrictions
tool to perform WEP attacks.
Shoulder surfing
tool to perform WEP attacks.
WEP2
tool to perform WEP attacks.
Keystream attack
tool to perform WEP attacks.
Access control
looking over someone's shoulder.
SSID
looking over someone's shoulder.
RC4
looking over someone's shoulder.
Cipher
looking over someone's shoulder.
AirSnort
looking over someone's shoulder.
Access restrictions
looking over someone's shoulder.
Shoulder surfing
looking over someone's shoulder.
WEP2
looking over someone's shoulder.
Keystream attack
looking over someone's shoulder.
Access control
method of determining the keystream by analyzing two packets that were created from the same IV.
SSID
method of determining the keystream by analyzing two packets that were created from the same IV.
RC4
method of determining the keystream by analyzing two packets that were created from the same IV.
Cipher
method of determining the keystream by analyzing two packets that were created from the same IV.
AirSnort
method of determining the keystream by analyzing two packets that were created from the same IV.
Access restrictions
method of determining the keystream by analyzing two packets that were created from the same IV.
Shoulder surfing
method of determining the keystream by analyzing two packets that were created from the same IV.
WEP2
method of determining the keystream by analyzing two packets that were created from the same IV.
Keystream attack
method of determining the keystream by analyzing two packets that were created from the same IV.
Access control
method of restricting access to resources.
SSID
method of restricting access to resources.
RC4
method of restricting access to resources.
Cipher
method of restricting access to resources.
AirSnort
method of restricting access to resources.
Access restrictions
method of restricting access to resources.
Shoulder surfing
method of restricting access to resources.
WEP2
method of restricting access to resources.
Keystream attack
method of restricting access to resources.
Access control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.