Deck 8: Wireless LAN Security and Vulnerabilities

ملء الشاشة (f)
exit full mode
سؤال
RC4 is a ____ cipher that accepts keys up to 128 bits in length.

A) stream
B) key
C) cyclic
D) logical
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In WEP, the CRC generates a(n) ____ based on the contents of the text.

A) initialization vector
B) cipher
C) checksum
D) key
سؤال
MAC address filtering ____.

A) is difficult to implement
B) requires pre-approved authentication
C) is expensive
D) does not work well
سؤال
Which aspect of information security does WEP protect?

A) availability
B) integrity
C) confidentiality
D) All of the above
سؤال
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.

A) plaintext
B) detext
C) ciphertext
D) deciphertext
سؤال
According to the IEEE 802.11 cryptography objectives, how strong should WEP be?

A) difficult
B) reasonably
C) extremely
D) unbreakable
سؤال
In a brute force attack, what key combination would follow 00001?

A) 00000
B) 00002
C) 00010
D) 10000
سؤال
Which type of attacker typically has a high skill level?

A) hacker
B) cracker
C) spy
D) All of the above
سؤال
A WEP key can be a passphrase created by entering ____ ASCII characters.

A) 3
B) 7
C) 10
D) 16
سؤال
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
سؤال
____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
سؤال
Wireless DoS attacks are exactly the same as wired DoS attacks.
سؤال
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) speed
B) cost
C) security
D) complexity
سؤال
A ____ is not malicious but often seeks to expose security flaws.

A) cracker
B) script kiddie
C) spy
D) hacker
سؤال
Cryptography is a new invention of the 20th Century.
سؤال
Information security involves more than protecting the information itself.
سؤال
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

A) Computer Emergency Response Team Coordination Center (CERT/CC)
B) InfraGard
C) National Security Institute (NSI)
D) SysAdmin, Audit, Network, Security (SANS) Institute
سؤال
Which characteristic of information is guarded by access control?

A) availability
B) integrity
C) confidentiality
D) robustness
سؤال
____ is another name for open systems authentication.

A) Public key encryption
B) Symmetric key encryption
C) WEP
D) SSID filtering
سؤال
Employees pose only a small threat to networks.
سؤال
What is a cracker?
سؤال
A ____ attack on WEP involves viewing collisions to derive plaintext values.

A) capture
B) keystream
C) weak key
D) pseudo-random number
سؤال
Describe one trend that is making security increasingly difficult.
سؤال
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
سؤال
A standard personal computer can easily create over ____ possible password combinations per second.

A) 100
B) 1,000
C) 1,000,000
D) 1,000,000,000
سؤال
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.

A) disassociation
B) drop
C) misaddressed
D) incomplete
سؤال
In a 64-bit packet sent using WEP, how many bits are actually encrypted?

A) 10
B) 24
C) 40
D) 64
سؤال
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.

A) spoof
B) break
C) modify
D) disable
سؤال
Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.
سؤال
Briefly describe the goal of InfraGard.
سؤال
Describe at least four weaknesses of open system authentication.
سؤال
Describe the five steps in the process of WEP encryption.
سؤال
The term _________________________ is frequently used to describe the tasks of guarding information that is in a digital format.
سؤال
In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.
سؤال
What are the three characteristics of information that must be protected by information security?
سؤال
On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
سؤال
Describe open system authentication.
سؤال
Briefly describe cryptography and discuss its history.
سؤال
Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information.
سؤال
Describe a man-in-the-middle attack.
سؤال
What is a dictionary attack?
سؤال
Match between columns
attacker floods the radio frequency spectrum with noise
filter
attacker floods the radio frequency spectrum with noise
hacker
attacker floods the radio frequency spectrum with noise
default key
attacker floods the radio frequency spectrum with noise
cipher
attacker floods the radio frequency spectrum with noise
cracker
attacker floods the radio frequency spectrum with noise
jam
attacker floods the radio frequency spectrum with noise
script kiddies
attacker floods the radio frequency spectrum with noise
keystream
attacker floods the radio frequency spectrum with noise
computer spy
person who has been hired to break into a computer and steal information
filter
person who has been hired to break into a computer and steal information
hacker
person who has been hired to break into a computer and steal information
default key
person who has been hired to break into a computer and steal information
cipher
person who has been hired to break into a computer and steal information
cracker
person who has been hired to break into a computer and steal information
jam
person who has been hired to break into a computer and steal information
script kiddies
person who has been hired to break into a computer and steal information
keystream
person who has been hired to break into a computer and steal information
computer spy
series of 1's and 0's equal in length to the text plus the ICV
filter
series of 1's and 0's equal in length to the text plus the ICV
hacker
series of 1's and 0's equal in length to the text plus the ICV
default key
series of 1's and 0's equal in length to the text plus the ICV
cipher
series of 1's and 0's equal in length to the text plus the ICV
cracker
series of 1's and 0's equal in length to the text plus the ICV
jam
series of 1's and 0's equal in length to the text plus the ICV
script kiddies
series of 1's and 0's equal in length to the text plus the ICV
keystream
series of 1's and 0's equal in length to the text plus the ICV
computer spy
key value that is used to encrypt wireless data transmissions when they are sent
filter
key value that is used to encrypt wireless data transmissions when they are sent
hacker
key value that is used to encrypt wireless data transmissions when they are sent
default key
key value that is used to encrypt wireless data transmissions when they are sent
cipher
key value that is used to encrypt wireless data transmissions when they are sent
cracker
key value that is used to encrypt wireless data transmissions when they are sent
jam
key value that is used to encrypt wireless data transmissions when they are sent
script kiddies
key value that is used to encrypt wireless data transmissions when they are sent
keystream
key value that is used to encrypt wireless data transmissions when they are sent
computer spy
person who violates system security with malicious intent
filter
person who violates system security with malicious intent
hacker
person who violates system security with malicious intent
default key
person who violates system security with malicious intent
cipher
person who violates system security with malicious intent
cracker
person who violates system security with malicious intent
jam
person who violates system security with malicious intent
script kiddies
person who violates system security with malicious intent
keystream
person who violates system security with malicious intent
computer spy
encryption algorithm
filter
encryption algorithm
hacker
encryption algorithm
default key
encryption algorithm
cipher
encryption algorithm
cracker
encryption algorithm
jam
encryption algorithm
script kiddies
encryption algorithm
keystream
encryption algorithm
computer spy
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
filter
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
hacker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
default key
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cipher
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cracker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
jam
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
script kiddies
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
keystream
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
computer spy
limit a user's admission to the access point
filter
limit a user's admission to the access point
hacker
limit a user's admission to the access point
default key
limit a user's admission to the access point
cipher
limit a user's admission to the access point
cracker
limit a user's admission to the access point
jam
limit a user's admission to the access point
script kiddies
limit a user's admission to the access point
keystream
limit a user's admission to the access point
computer spy
unskilled or novice users who break into computer systems with malicious intent
filter
unskilled or novice users who break into computer systems with malicious intent
hacker
unskilled or novice users who break into computer systems with malicious intent
default key
unskilled or novice users who break into computer systems with malicious intent
cipher
unskilled or novice users who break into computer systems with malicious intent
cracker
unskilled or novice users who break into computer systems with malicious intent
jam
unskilled or novice users who break into computer systems with malicious intent
script kiddies
unskilled or novice users who break into computer systems with malicious intent
keystream
unskilled or novice users who break into computer systems with malicious intent
computer spy
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Wireless LAN Security and Vulnerabilities
1
RC4 is a ____ cipher that accepts keys up to 128 bits in length.

A) stream
B) key
C) cyclic
D) logical
A
2
In WEP, the CRC generates a(n) ____ based on the contents of the text.

A) initialization vector
B) cipher
C) checksum
D) key
C
3
MAC address filtering ____.

A) is difficult to implement
B) requires pre-approved authentication
C) is expensive
D) does not work well
B
4
Which aspect of information security does WEP protect?

A) availability
B) integrity
C) confidentiality
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.

A) plaintext
B) detext
C) ciphertext
D) deciphertext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to the IEEE 802.11 cryptography objectives, how strong should WEP be?

A) difficult
B) reasonably
C) extremely
D) unbreakable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
In a brute force attack, what key combination would follow 00001?

A) 00000
B) 00002
C) 00010
D) 10000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which type of attacker typically has a high skill level?

A) hacker
B) cracker
C) spy
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
A WEP key can be a passphrase created by entering ____ ASCII characters.

A) 3
B) 7
C) 10
D) 16
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Wireless DoS attacks are exactly the same as wired DoS attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) speed
B) cost
C) security
D) complexity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ____ is not malicious but often seeks to expose security flaws.

A) cracker
B) script kiddie
C) spy
D) hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
Cryptography is a new invention of the 20th Century.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Information security involves more than protecting the information itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

A) Computer Emergency Response Team Coordination Center (CERT/CC)
B) InfraGard
C) National Security Institute (NSI)
D) SysAdmin, Audit, Network, Security (SANS) Institute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which characteristic of information is guarded by access control?

A) availability
B) integrity
C) confidentiality
D) robustness
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ is another name for open systems authentication.

A) Public key encryption
B) Symmetric key encryption
C) WEP
D) SSID filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Employees pose only a small threat to networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is a cracker?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
A ____ attack on WEP involves viewing collisions to derive plaintext values.

A) capture
B) keystream
C) weak key
D) pseudo-random number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe one trend that is making security increasingly difficult.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A standard personal computer can easily create over ____ possible password combinations per second.

A) 100
B) 1,000
C) 1,000,000
D) 1,000,000,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.

A) disassociation
B) drop
C) misaddressed
D) incomplete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
In a 64-bit packet sent using WEP, how many bits are actually encrypted?

A) 10
B) 24
C) 40
D) 64
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.

A) spoof
B) break
C) modify
D) disable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Briefly describe the goal of InfraGard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe at least four weaknesses of open system authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe the five steps in the process of WEP encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The term _________________________ is frequently used to describe the tasks of guarding information that is in a digital format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the three characteristics of information that must be protected by information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe open system authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Briefly describe cryptography and discuss its history.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe a man-in-the-middle attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is a dictionary attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
attacker floods the radio frequency spectrum with noise
filter
attacker floods the radio frequency spectrum with noise
hacker
attacker floods the radio frequency spectrum with noise
default key
attacker floods the radio frequency spectrum with noise
cipher
attacker floods the radio frequency spectrum with noise
cracker
attacker floods the radio frequency spectrum with noise
jam
attacker floods the radio frequency spectrum with noise
script kiddies
attacker floods the radio frequency spectrum with noise
keystream
attacker floods the radio frequency spectrum with noise
computer spy
person who has been hired to break into a computer and steal information
filter
person who has been hired to break into a computer and steal information
hacker
person who has been hired to break into a computer and steal information
default key
person who has been hired to break into a computer and steal information
cipher
person who has been hired to break into a computer and steal information
cracker
person who has been hired to break into a computer and steal information
jam
person who has been hired to break into a computer and steal information
script kiddies
person who has been hired to break into a computer and steal information
keystream
person who has been hired to break into a computer and steal information
computer spy
series of 1's and 0's equal in length to the text plus the ICV
filter
series of 1's and 0's equal in length to the text plus the ICV
hacker
series of 1's and 0's equal in length to the text plus the ICV
default key
series of 1's and 0's equal in length to the text plus the ICV
cipher
series of 1's and 0's equal in length to the text plus the ICV
cracker
series of 1's and 0's equal in length to the text plus the ICV
jam
series of 1's and 0's equal in length to the text plus the ICV
script kiddies
series of 1's and 0's equal in length to the text plus the ICV
keystream
series of 1's and 0's equal in length to the text plus the ICV
computer spy
key value that is used to encrypt wireless data transmissions when they are sent
filter
key value that is used to encrypt wireless data transmissions when they are sent
hacker
key value that is used to encrypt wireless data transmissions when they are sent
default key
key value that is used to encrypt wireless data transmissions when they are sent
cipher
key value that is used to encrypt wireless data transmissions when they are sent
cracker
key value that is used to encrypt wireless data transmissions when they are sent
jam
key value that is used to encrypt wireless data transmissions when they are sent
script kiddies
key value that is used to encrypt wireless data transmissions when they are sent
keystream
key value that is used to encrypt wireless data transmissions when they are sent
computer spy
person who violates system security with malicious intent
filter
person who violates system security with malicious intent
hacker
person who violates system security with malicious intent
default key
person who violates system security with malicious intent
cipher
person who violates system security with malicious intent
cracker
person who violates system security with malicious intent
jam
person who violates system security with malicious intent
script kiddies
person who violates system security with malicious intent
keystream
person who violates system security with malicious intent
computer spy
encryption algorithm
filter
encryption algorithm
hacker
encryption algorithm
default key
encryption algorithm
cipher
encryption algorithm
cracker
encryption algorithm
jam
encryption algorithm
script kiddies
encryption algorithm
keystream
encryption algorithm
computer spy
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
filter
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
hacker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
default key
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cipher
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cracker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
jam
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
script kiddies
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
keystream
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
computer spy
limit a user's admission to the access point
filter
limit a user's admission to the access point
hacker
limit a user's admission to the access point
default key
limit a user's admission to the access point
cipher
limit a user's admission to the access point
cracker
limit a user's admission to the access point
jam
limit a user's admission to the access point
script kiddies
limit a user's admission to the access point
keystream
limit a user's admission to the access point
computer spy
unskilled or novice users who break into computer systems with malicious intent
filter
unskilled or novice users who break into computer systems with malicious intent
hacker
unskilled or novice users who break into computer systems with malicious intent
default key
unskilled or novice users who break into computer systems with malicious intent
cipher
unskilled or novice users who break into computer systems with malicious intent
cracker
unskilled or novice users who break into computer systems with malicious intent
jam
unskilled or novice users who break into computer systems with malicious intent
script kiddies
unskilled or novice users who break into computer systems with malicious intent
keystream
unskilled or novice users who break into computer systems with malicious intent
computer spy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.