Chapter 5: Protecting Wireless Networks Flashcards

1
Q

802.11

A

1-2 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11a

A

54 Mbps

5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11b

A

11 Mbps

2.4 GHz

Wi-Fi!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11g

A

54 Mbps

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11i

A

Provides for security enhancements, often referred to as WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11n

A

Under the right conditions 600 Mbps, but realistically less

Can operate in both 2.4 GHz and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IV Attack

A

Attackers cracking the WEP initialization vector by examining its repeats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Temporal Key Integrity Protocol (TKIP)

A

Placed a 128-bit wrapper around the WEP encryption with a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Markup Language (WML)

A

A smaller version of HTML used by WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gap in the WAP

A

The security concern that exists when converting between WAP (Wireless Application Protocol) and SSL/TLS and exposing plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA Features

A
  • RC4 with TKIP

- Compatible with older devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPA2 Features

A
  • CCMP

- Not compatible with older devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A

128-bit AES encryption with a 48 bit initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Application Protocol (WAP)

A

A data transmission standard that is meant to be like TCP/IP for wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless TLS

A
  • Provides authentication, encryption, and data integrity for wireless devices.
  • Supports wireless devices that don’t have extremely powerful processors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless Session Protocol (WSP)

A

Manages the session info and connection between the devices

17
Q

Wireless Transaction Protocol (WTP)

A

Provides services similar to TCP and UDP for WAP

18
Q

Wireless Datagram Protocol (WDP)

A

Provides the common interface between devices

19
Q

Transceiver

A

Transmitter/receiver, AKA a wireless access point

20
Q

What portion of the RF spectrum do wireless technologies use?

A

Microwave

21
Q

All antennas are rated in terms of _______.

A

Gain value

22
Q

Captive Portal

A

Requires users to agree to some condition before they use the network.

23
Q

Extensible Authentication Protocol (EAP)

A

Provides a framework for authentication that is often used with wireless networks

24
Q

Wi-Fi Protected Setup (WPS)

A

EAP message(s) that require some sort of authentication to join the network

25
Q

Lightweight EAP (LEAP)

A

Requires mutual authentication, but is susceptible to dictionary attacks

26
Q

Protected EAP (PEAP)

A

Replacement of LEAP that establishes an encrypted channel between server and client

27
Q

Cloaking

A

Turning off the SSID broadcast on a WAP

28
Q

Rogue Access Point

A

An access point added to your network that has not been authorized

29
Q

Evil Twin

A

A rogue access point that poses as a legit access point

30
Q

Bluejacking

A

Sending of unsolicited messages (spam) over a Bluetooth connection

31
Q

Bluesnarfing

A

Gaining unauthorized access through a bluetooth connection