Key Terms
Protocols
Encryption Types
Wireless Attacks
Random
100
What is defined as "the transmission of the SSID from the access point to wireless devices?"
What is an SSID broadcast.
100
TKIP (temporal key integrity protocol) is used in what wireless security protocol?
What is WPA.
100
What wireless protocol is considered to be the most secure?
What is WPA2.
100
Why is a rogue access point considered dangerous? What is the name of an attack that is similar to a rogue access point?
It allows an attacker to bypass the security perimeter set up by the network. An evil twin is a similar attack, but it is set up by someone outside the network (e.g. hacker).
100
What is it called when a device looks for beacon frames?
What is scanning.
200
What is defined as, " a method for controlling access to a WLAN based on the device's MAC address?"
What is MAC address filtering.
200
Name a weakness of WEP.
WEP has a relatively short IV (initialization vector) length. It also violates the cardinal rule of cryptography by creating a detectable pattern.
200
Lightweight EAP (LEAP) is proprietary software developed by what company?
What is Cisco Systems.
200
How does bluesnarfing differ from bluejacking?
Bluejacking is considered to be more annoying than harmful, because it is an attack that sends unsolicited messages to Bluetooth-enabled devices. Bluesnarfing is an attack where a hacker accesses unauthorized information through a Bluetooth connection.
200
What are the war chalking symbols used for a closed and open network?
Closed network = oval. Open network = two semi-circles facing away from each other.
300
What is defined as, "the process of documenting and then advertising the location of wireless LANs for others to use?"
What is war chalking.
300
How many bits are in a TKIP key?
128 bits.
300
What type of authentication does WPA2 use?
What is 802.1x.
300
Define war driving and list at least three tools needed to do this.
War driving is searching for a wireless signla from a car on on foot using a portable computing device. Tools that you need include a mobile computing device, wireless NIC adapter, antenna(s), specialized software, and (optionally) a GPS receiver.
300
What is a vulnerability of MAC filtering?
MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.
400
Define a keystream attack.
A method of determining the keystream by analyzing two packets that were created from the same initialization vector (IV).
400
What encryption protocol standard is used for WPA2?
What is AES-CCMP.
400
What are the four types of packets that EAP uses?
What are request, response, success, and failure packets.
400
What is the definition of a piconet?
A piconet is what is created when two Bluetooth devices come within range of each other and connect automatically (see page 295 for picture).
400
A PSK passphrase of fewer than how many characters (using dictionary words) is considered vulnerable?
What is 20 characters. (See page 309 for more information.)
500
Define initialization vector.
It is a 24-bit value used in WEP that changes each time a packet is encrypted.
500
EAP is considered a ________ for transporting authentication protocols instead of the authentication protocol itself.
Framework
500
What protocol uses Microsoft Windows logins and passwords to simplify 802.1x?
What is Protected EAP (PEAP).
500
Name the two functions of an AP.
It acts as the "base station" for the wireless network and acts as a bridge between the wired and wireless networks.
500
What is the standard that specifies a minimum speed of 54 Mbps and uses the 5 GHz spectrum?
What is the IEEE 802.11a standard
M
e
n
u