Wireless Terminology
Wireless Security
Types of Wireless Encryption
Bluetooth/Wireless
Iot and such
100

Describes the amount of information that may be broadcast over a connection

Bandwidth

100

Wireless network (Wi-Fi) refers to WLANs based on what standard?

IEEE 802.11 standard

100

An encryption algorithm has significant vulnerabilities and can be easily cracked.

WEP

100

This is a short-range wireless communication technology that replaces the cables connecting portable or fixed devices while maintaining high levels of security.

Bluetooth

100

What is a Signaling System 7 (SS7) protocol and what is it vulnerable to?

a communication protocol that allows mobile users to exchange communication through another cellular network. it is vulnerable to man-in-the-middle attacks.

200

Used to connect wireless devices to a wireless/wired network

Access point (AP)

200

An advanced wireless encryption protocol that uses TKIP and MIC

WPA

200

An upgrade to WPA using AES and CCMP

WPA2

200

What are the three Bluetooth modes?

Discoverable, Limited discoverable, and non-discoverable

200

What are three challenges in regards to security involving IoT?

1. Lack of security/privacy                     5. Clear text protocols/open ports

2. Vulnerable to web interfaces              6. coding errors (buffer overflow)

3. Legal, regulatory, rights issues           7. storage issues

4. Default, weak, hardcoded credentials  8. difficult to update firmware/OS

300

A universal system used for mobile transportation for wireless networks worldwide.

GSM

300

An encryption protocol used in WPA2 for stronger encryption and authentication

CCMP

300
What is the difference between WPA2-Personal and WPA2-Enterprise?

WPA2-Personal uses a set-up password to protect unauthorized network access while WPA2-Enterprise includes EAP or RADIUS for centralized client authentication using multiple authentication methods

300

This is a DoS attack, which overflows Bluetooth-enabled devices with random packets causing it to crash

Bluesmacking

300

What is OT and what was it designed for?

OT is Operational Technology and it was designed to detect or cause changes in industrial operations through direct monitoring and/or controlling of industrial physical devices.

400

The MAC address of an AP that has set up a Basic Service Set (BSS)

BSSID

400
A symmetric-key encryption, used in WPA2 as a replacement for TKIP

AES

400

The wireless encryption method is an advanced implementation of WPA2 that provides protection from offline dictionary attacks and uses the AES-GCMP 256 encryption algorithm

WPA3

400

This is the theft of information from a wireless device through a Bluetooth connection

Bluesnarfing

400

This occurs when a perpetrator injects any faulty or malicious program into the system to compromise the system security

Fault injection attacks

500

A set of frequencies for the international industrial, scientific, and medical communities.

ISM band

500

A centralized authentication and authorization management system.

RADIUS

500

Temporal Key Integrity Protocol (TKIP) utilizes what type of cipher?

RC4 stream cipher with 128-bit keys

500

This attack is carried out by persuading the victim to install a malicious app designed by the attacker. This malicious app replaces legitimate apps, allowing the attacker to generate a large volume of ads on the victim's device through the infected apps.

Agent Smith Attack

500

OT consists of this to monitor and control the industrial operations

Industrial Control Systems (ICS)

M
e
n
u