Bluetooth
Attacks
Vulnerabilities
Security
Hodge-podge
100
The type of short-range transmission that Bluetooth uses for wireless technology
What is radio frequency (RF)
100
The attack that sends unsolicited messages to Bluetooth-enabled devices
What is bluejacking
100
The least secure wireless category
What is WEP - Wired Equivalent Privacy
100
The encryption technology “wrapper” around WEP that adds additional layer of security but still preserving WEP’s basic functionality
What is TKIP - Temporal Integrity Protocol
100
This is the most influential organization for computer networking and wireless communications that began developing network architecture standards in 1980s. In 1997 they released the 802.11 standard for wireless local area networks (WLANs)
What is Institute of Electrical and Electronics Engineers (IEEE)
200
A type of Bluetooth network topology
What is Piconet or Scatternet
200
It is the unauthorized access to wireless information through Bluetooth connection, often between cell phones and laptops.
What is bluesnarfing
200
The method of controlling WLAN access limit a device’s access to AP, it is used by nearly all wireless AP vendors that permits or blocks device based on MAC address
What is MAC Address Filtering
200
The secret value that is manually entered on both AP and each wireless device (essentially identical to “shared secret” used in WEP)
What is Preshared Key (PSK) Authentication
200
The low speed and low power technology for smartphones and smart cards. It is used to establish communication between devices in close proximity, once devices tapped together or brought within several centimeters each other two-way communication established.
What is Near field communication (NFC)
300
Bluetooth technology data communication over short distances
What is Personal Area Network (PAN)
300
An unauthorized AP that allows attacker to bypass network security configurations and opens network and users to attacks.
What is rouge access point
300
The security protocol that is limited by length of IV of only 24 bits and creates detectable pattern that can provide attacker with valuable information to break encryption
What is WEP - Wired Equivalent Privacy
300
A agreement or policy that a public area served by WLAN usually advertises itself or wants user to read and accept before using WLAN
What is Acceptable Use Policy (AUP)
300
An AP's 2 basic function for a wireless network
What is “base station” or a bridge
400
The number of devices that a Bluetooth network consists if there is one primary device and
What is up to 7
400
It uses intentional RF interference to flood RF spectrum with enough interference to prevent device from effectively communicating with AP
What is RF jamming
400
A user supplied network name for a wireless network that is broadcasted and can be turned off for a weak degree of security.
What is Service Set Identifier (SSID)
400
2 out of 4 types of methods to detect rogue AP
What is Wireless device probe, Desktop probe, Access point probe, dedicated probe
400
The encryption protocol for WPA2
What is Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
500
The IEEE defined specifications for a wireless LAN which covers the physical and data link layers.
What is IEEE 802.11
500
This is a method for searching for wireless signals from automobile or on foot using portable computing device and the method for documenting and advertising location of wireless LANs for others. (2 answers)
What is War driving & War chalking
500
The two modes of WPA * Designed for individuals or small office/home office (SOHO) settings, which typically have 10 or fewer employees * Intended for larger enterprises, schools, and government agencies
What is WPA Personal & Enterprise
500
This uses standard web browser to provide information, give wireless user opportunity to agree to policy and present valid login credentials
What is Captive portal AP
500
They are two common EAP (Extensible Authentication Protocol) protocols
What is Lightweight EAP (LEAP) and Protected EAP (PEAP)