Deck 7: Understanding Wireless Security

Full screen (f)
exit full mode
Question
Which layer does wireless communication rely heavily upon?

A) MAC sublayer of the Network layer
B) MAC sublayer of the Data Link layer
C) LLC sublayer of the Data Link layer
D) LLC sublayer of the Transport layer
Use Space or
up arrow
down arrow
to flip the card.
Question
A RTS frame is the first step of the two-way handshake before sending a data frame.
Question
SNMP requires the installation of an SNMP agent on the device you want to monitor.
Question
Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.
Question
Which of the following is NOT a field in a control frame?

A) Duration
B) Sequence control
C) Frame control
D) Frame check sequence
Question
Wireless networks are essentially the same as wired networks when it comes to the security threats each faces.
Question
In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?

A) association flood
B) jamming
C) session hijacking
D) MAC address spoofing
Question
Which of the following is true about the association process?

A) it is a three-step process
B) a station first listens for beacons
C) a station first send an association request
D) the AP transmits an invitation to associate
Question
In which type of attack do attackers intercept the transmissions of two communicating nodes without the user's knowledge?

A) rogue device
B) wardriver
C) man-in-the-middle
D) brute force
Question
What is considered to be one of the biggest weaknesses of WEP?

A) 24-bit initialization vector
B) RC4 encryption
C) 128-bit key
D) Kerberos authentication
Question
Which type of control frame does a station send to let the AP know is can transmit buffered frames?

A) CTS
B) ACK
C) RTS
D) PS-Poll
Question
What is a WNIC's equivalent of a NIC's promiscuous mode?

A) active scan mode
B) RF monitor mode
C) passive attack mode
D) auto-capture mode
Question
Wireless networks use the CSMA/CD media access method.
Question
Which of the following is true about the SSID?

A) they can be Null
B) they are registered
C) they are not found in beacon frames
D) they are found in control frames
Question
Which management frame type is sent by a station wanting to terminate the connection?

A) Deauthentication
B) Disassociation
C) Reassociation request
D) Probe response
Question
Which of the following is true about wardriving?

A) attackers use RF monitor mode
B) the hardware is very expensive
C) the software is very expensive
D) their goal is simply to hijack a connection
Question
Which of the following is NOT part of a wireless MAC frame?

A) 802.11 protocol version
B) source MAC address
C) FCS
D) TTL
Question
Which type of frame advertises services or information on a wireless network?

A) Probe request
B) Association response
C) Beacon
D) Probe response
Question
What function does a RADIUS server provide to a wireless network?

A) association
B) encryption
C) decryption
D) authentication
Question
Which of the following is performed by the MAC sublayer?

A) joining the wireless network
B) resolving IP address to MAC address
C) resolving names to IP addresses
D) determining best path
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
capturing network traffic during transmission
Question
MIBs gather data and report it to a(n)____________________ management station.
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an in-depth examination of a proposed wireless network site
Question
___________ key encryption in WEP uses the RC4 encryption algorithm.
Question
A ____________ response is sent by a station in response to a request frame and indicates capabilities,supported data rates,and other information.
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
any keys used between a pair of devices in TKIP
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that gives a station clearance to begin transmitting packets
Question
Which of the following is true about MAC addresses in a wireless network?

A) MAC address filtering will stop a determined attacker
B) MAC addresses are Network layer identities
C) you need to configure the MAC address before you use the WNIC
D) you can change a WNICs MAC address with software
Question
Which EAP protocol requires digital certificates to validate supplicants?

A) EAP-TLS
B) EAP-TTLS
C) LEAP
D) FAST
Question
A _____________ device is a wireless device that employees connect and use without authorization or verified configurations.
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the process of using a variety of tools and techniques to attempt to break into a network
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the encryption and authentication architecture based on the final ratified IEEE 802.11i standard
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an encryption method devised as a replacement for WEP in WPA
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a two-step process of being accepted into a wireless network
Question
Which of the following is NOT a suggested practice before using a newly configured wireless network?

A) change the administrator password
B) change the manufacturer's default key
C) use the default encryption method
D) alter the default channel
Question
Each access point has a(n)______________ that essentially functions as the name of the network.
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that a station sends when it wants to transmit
Question
Which popular wireless sniffer is an IDS that is passive and undetectable in operation?

A) Kismet
B) NetStumbler
C) AirSnort
D) Aircrack-ng
Question
Which of the following is true about IEEE 802.11i?

A) it uses WEP2 for authentication and encryption
B) it uses a symmetric block cipher for encryption
C) temporal key integrity protocol is used for encryption
D) it uses PMK to generate data encryption keys
Question
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
attacks that attempt to gather information for subsequent attacks by sending probe request frames on each available channel
Question
List the three types of MAC frames defined by the 802.11 standard.
Question
How is wireless security different than wired security?
Question
Describe 802.1x authentication.
Question
List the four most common types of control frames.
Question
What is the purpose of MAC address filtering and how can attackers defeat it?
Question
List and define the fields in a control frame.
Question
Describe forged deauthentication.
Question
List four issues that a wireless security policy should address.
Question
What are the two authentication methods provided by early 802.11 standards?
Question
What is a site survey and why should you conduct one?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Understanding Wireless Security
1
Which layer does wireless communication rely heavily upon?

A) MAC sublayer of the Network layer
B) MAC sublayer of the Data Link layer
C) LLC sublayer of the Data Link layer
D) LLC sublayer of the Transport layer
B
2
A RTS frame is the first step of the two-way handshake before sending a data frame.
True
3
SNMP requires the installation of an SNMP agent on the device you want to monitor.
True
4
Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a field in a control frame?

A) Duration
B) Sequence control
C) Frame control
D) Frame check sequence
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Wireless networks are essentially the same as wired networks when it comes to the security threats each faces.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?

A) association flood
B) jamming
C) session hijacking
D) MAC address spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is true about the association process?

A) it is a three-step process
B) a station first listens for beacons
C) a station first send an association request
D) the AP transmits an invitation to associate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In which type of attack do attackers intercept the transmissions of two communicating nodes without the user's knowledge?

A) rogue device
B) wardriver
C) man-in-the-middle
D) brute force
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What is considered to be one of the biggest weaknesses of WEP?

A) 24-bit initialization vector
B) RC4 encryption
C) 128-bit key
D) Kerberos authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which type of control frame does a station send to let the AP know is can transmit buffered frames?

A) CTS
B) ACK
C) RTS
D) PS-Poll
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What is a WNIC's equivalent of a NIC's promiscuous mode?

A) active scan mode
B) RF monitor mode
C) passive attack mode
D) auto-capture mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Wireless networks use the CSMA/CD media access method.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about the SSID?

A) they can be Null
B) they are registered
C) they are not found in beacon frames
D) they are found in control frames
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which management frame type is sent by a station wanting to terminate the connection?

A) Deauthentication
B) Disassociation
C) Reassociation request
D) Probe response
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is true about wardriving?

A) attackers use RF monitor mode
B) the hardware is very expensive
C) the software is very expensive
D) their goal is simply to hijack a connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT part of a wireless MAC frame?

A) 802.11 protocol version
B) source MAC address
C) FCS
D) TTL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which type of frame advertises services or information on a wireless network?

A) Probe request
B) Association response
C) Beacon
D) Probe response
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What function does a RADIUS server provide to a wireless network?

A) association
B) encryption
C) decryption
D) authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is performed by the MAC sublayer?

A) joining the wireless network
B) resolving IP address to MAC address
C) resolving names to IP addresses
D) determining best path
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
capturing network traffic during transmission
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
MIBs gather data and report it to a(n)____________________ management station.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an in-depth examination of a proposed wireless network site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
___________ key encryption in WEP uses the RC4 encryption algorithm.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A ____________ response is sent by a station in response to a request frame and indicates capabilities,supported data rates,and other information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
any keys used between a pair of devices in TKIP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that gives a station clearance to begin transmitting packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is true about MAC addresses in a wireless network?

A) MAC address filtering will stop a determined attacker
B) MAC addresses are Network layer identities
C) you need to configure the MAC address before you use the WNIC
D) you can change a WNICs MAC address with software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which EAP protocol requires digital certificates to validate supplicants?

A) EAP-TLS
B) EAP-TTLS
C) LEAP
D) FAST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A _____________ device is a wireless device that employees connect and use without authorization or verified configurations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the process of using a variety of tools and techniques to attempt to break into a network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the encryption and authentication architecture based on the final ratified IEEE 802.11i standard
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an encryption method devised as a replacement for WEP in WPA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a two-step process of being accepted into a wireless network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is NOT a suggested practice before using a newly configured wireless network?

A) change the administrator password
B) change the manufacturer's default key
C) use the default encryption method
D) alter the default channel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Each access point has a(n)______________ that essentially functions as the name of the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that a station sends when it wants to transmit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which popular wireless sniffer is an IDS that is passive and undetectable in operation?

A) Kismet
B) NetStumbler
C) AirSnort
D) Aircrack-ng
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is true about IEEE 802.11i?

A) it uses WEP2 for authentication and encryption
B) it uses a symmetric block cipher for encryption
C) temporal key integrity protocol is used for encryption
D) it uses PMK to generate data encryption keys
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
attacks that attempt to gather information for subsequent attacks by sending probe request frames on each available channel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
List the three types of MAC frames defined by the 802.11 standard.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How is wireless security different than wired security?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe 802.1x authentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List the four most common types of control frames.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is the purpose of MAC address filtering and how can attackers defeat it?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and define the fields in a control frame.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe forged deauthentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List four issues that a wireless security policy should address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What are the two authentication methods provided by early 802.11 standards?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a site survey and why should you conduct one?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.