Deck 9: Wireless Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 9: Wireless Network Security
1
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
True
2
Piconets in which connections exist between different piconets are known as a:
A)broadnet
B)honeynet
C)boundnet
D)scatternet
A)broadnet
B)honeynet
C)boundnet
D)scatternet
D
3
What is the maximum range of most Bluetooth devices?
A)10 ft
B)18 meters
C)15 meters
D)33 ft
A)10 ft
B)18 meters
C)15 meters
D)33 ft
D
4
Which option below is responsible for the issuing of EAP request packets?
A)supplicant
B)authenticator
C)authentication server
D)proxy
A)supplicant
B)authenticator
C)authentication server
D)proxy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
A)active twin
B)authorized twin
C)internal replica
D)evil twin
A)active twin
B)authorized twin
C)internal replica
D)evil twin
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP, with the intent to redirect client devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
A)Access Point
B)Endpoint
C)WMM
D)Ad-hoc peer
A)Access Point
B)Endpoint
C)WMM
D)Ad-hoc peer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What is the maximum number of characters that can exist within an SSID name?
A)10
B)12
C)26
D)32
A)10
B)12
C)26
D)32
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?
A)TKIP
B)LEAP
C)PEAP
D)ICMP
A)TKIP
B)LEAP
C)PEAP
D)ICMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
APs use antennas that radiate a signal in all directions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?
A)LEAP
B)TKIP
C)EAP
D)PEAP
A)LEAP
B)TKIP
C)EAP
D)PEAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which encryption protocol below is used in the WPA2 standard?
A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?
A)24 bits
B)32 bits
C)48 bits
D)64 bits
A)24 bits
B)32 bits
C)48 bits
D)64 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Bluetooth devices are not backward compatible with previous versions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Bluetooth is an example of what type of technology below?
A)Small Area Network
B)Private Area Network
C)Personal Area Network
D)Limited Area Network
A)Small Area Network
B)Private Area Network
C)Personal Area Network
D)Limited Area Network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Slave devices that are connected to a piconet and are sending transmissions are known as what?
A)Active slave
B)Passive slaves
C)Hybrid drones
D)Neutral drones
A)Active slave
B)Passive slaves
C)Hybrid drones
D)Neutral drones
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:
A)EAP-MSCHAPv2
B)EAP-AKA
C)EAP-FAST
D)EAP-SIM
A)EAP-MSCHAPv2
B)EAP-AKA
C)EAP-FAST
D)EAP-SIM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?
A)Bluetooth v2.1
B)Bluetooth v1.2
C)Bluetooth v 1.0
D)Bluetooth v 1.1
A)Bluetooth v2.1
B)Bluetooth v1.2
C)Bluetooth v 1.0
D)Bluetooth v 1.1
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?
A)Bluejacking
B)Bluecracking
C)Bluesnarfing
D)Bluetalking
A)Bluejacking
B)Bluecracking
C)Bluesnarfing
D)Bluetalking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
When using AES-CCMP, the AES-256 bit key requires how many rounds?
A)4
B)10
C)13
D)15
A)4
B)10
C)13
D)15
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
A)random
B)sanctioned
C)rogue
D)legitimate
A)random
B)sanctioned
C)rogue
D)legitimate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?
A)Gateway access point
B)Captive portal access point
C)Wireless device probe
D)AUP Enforcement access point
A)Gateway access point
B)Captive portal access point
C)Wireless device probe
D)AUP Enforcement access point
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
A 24-bit value used in WEP that changes each time a packet is encrypted.
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
A 24-bit value used in WEP that changes each time a packet is encrypted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
When a wireless device looks for beacon frames it is known as ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following choices is not one of the four types of packets used by EAP?
A)Request
B)Response
C)Success
D)Error
A)Request
B)Response
C)Success
D)Error
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
If the EAP authentication is successful, a success packet is sent to the ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An attack that sends unsolicited messages to Bluetooth-enabled devices
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
An attack that sends unsolicited messages to Bluetooth-enabled devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A __________________ is an in-depth examination and analysis of a wireless LAN site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Matching
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
Searching for wireless signals from an automobile or on foot using a portable computing device
a. Bluejacking
b. Bluesnarfing
c. Initialization vector (IV)
d. Near field communication (NFC)
e. Preshared key (PSK)
f. RF Jamming
g. War driving
h. Wi-Fi Protected Setup (WPS)
i. Wi-Fi Protected Access 2 (WPA 2)
j. Wired Equivalent Privacy (WEP)
Searching for wireless signals from an automobile or on foot using a portable computing device
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe a piconet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the Message Integrity Check (MIC) within WPA used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss the different types of interference one might encounter using wireless devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the role of the IEEE in computer networking and wireless communications?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Identify and describe two types of wireless probes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain why it is important to be able to control the power level at which the WLAN transmits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain what war driving is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss how to prevent bluesnarfing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What are the four types of packets used by EAP?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List and describe the major parts of an access point.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck