Deck 9: Wireless LAN Security Vulnerabilities

Full screen (f)
exit full mode
Question
A WLAN can contain many entry points,making security more difficult than with a wired LAN.
Use Space or
up arrow
down arrow
to flip the card.
Question
Searching for unprotected wireless networks is called what?

A) WLAN trolling
B) war driving
C) battle testing
D) wireless fishing
Question
____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
Question
Which of the following is NOT an information security layer?

A) products
B) people
C) prevention
D) procedures
Question
The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?

A) inserting network traffic
B) denial of service
C) hijacking the wireless connection
D) reading data
Question
A ____ attack on WEP involves identifying two packets derived from the same IV.

A) capture
B) keystream
C) weak key
D) pseudo-random number
Question
With WEP,it is impossible for an attacker to identify two packets derived from the same initialization vector.
Question
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) availability
B) cost
C) security
D) complexity
Question
WEP guards one of the CIA characteristics,namely what?

A) integrity
B) availability
C) confidentiality
D) access control
Question
Cleartext that has been encrypted is referred to as which of the following?

A) plaintext
B) cryptography
C) ciphertext
D) keytext
Question
Wireless security was implemented well in the original 802.11 standard.
Question
A user needs to enter the service set identifier manually when which weak security measure is employed?

A) WEP encryption
B) Open System Authentication
C) SSID hiding
D) shared key authentication
Question
Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard.
Question
Attacks that use many computers to attack a single network are called centralized attacks.
Question
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?

A) NIC blocking
B) MAC address filtering
C) Network blocking
D) IP address filtering
Question
A key that creates a detectable pattern is referred to as which of the following?

A) repeating key
B) plain key
C) weak key
D) crypto key
Question
Which is true about WEP?

A) uses a shared secret key
B) uses a public/private key pair
C) two keys are maintained
D) must be at least 32 bits in length
Question
A rogue AP can be described as which of the following?

A) an AP whose security settings have not been set
B) an AP designed to mimic an authorized AP
C) an AP that has malfunctioned and allows unauthorized users to access it
D) an unauthorized AP brought into the enterprise network
Question
On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Question
An attacker spoofs frames to prevent a client from remaining connected to the WLAN.What type of an attack is this?

A) RF jamming
B) man-in-the-middle
C) hijacking
D) denial of service
Question
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)

A) only Windows uses MAC addresses,excluding other OSs from this method
B) MAC addresses can be spoofed
C) the MAC address can be captured by forcing a reassociation
D) MAC address management can be difficult
Question
Briefly define cryptography.
Question
Describe one weakness of MAC address filtering.
Question
What is a distributed attack?
Question
Describe how an attacker can hijack a wireless connection.
Question
Describe the five steps in the process of WEP encryption.
Question
List and describe the three characteristics of information that must be protected by information security?
Question
The three protections that must be extended over information can be described by the acronym ________.
Question
Describe three limitations of SSID hiding.
Question
How have WLANs changed 'hard edges' into 'blurred edges'?
Question
Which of the following are difficulties faced in defending attacks? (Choose all that apply.)

A) universally connected devices
B) operating system vendor's lack of concern about security
C) increased speed of attacks
D) attacks that are more complex
Question
____________________ ensures that no unauthorized person or software has altered the information.
Question
Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.
Question
Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)

A) efficient
B) self-synchronizing
C) mandatory
D) exclusive
Question
WEP protects _______________ by scrambling the wireless data as it is transmitted.
Question
Describe open system authentication.
Question
Wireless access control is intended to limit a user's admission to the _______.
Question
What three categories can the protections implemented in the original 802.11 standard be divided into? (Choose three.)

A) access control
B) MAC address filtering
C) wired equivalent privacy
D) authentication
Question
Describe war driving.
Question
Match between columns
an imposter AP that is set up by an attacker
plaintext
an imposter AP that is set up by an attacker
man-in-the-middle
an imposter AP that is set up by an attacker
denial of service
an imposter AP that is set up by an attacker
weak keys
an imposter AP that is set up by an attacker
decryption
an imposter AP that is set up by an attacker
RF jamming
an imposter AP that is set up by an attacker
evil twin
an imposter AP that is set up by an attacker
ciphertext
an imposter AP that is set up by an attacker
keystream
an imposter AP that is set up by an attacker
access control
granting or denying approval to use specific resources
plaintext
granting or denying approval to use specific resources
man-in-the-middle
granting or denying approval to use specific resources
denial of service
granting or denying approval to use specific resources
weak keys
granting or denying approval to use specific resources
decryption
granting or denying approval to use specific resources
RF jamming
granting or denying approval to use specific resources
evil twin
granting or denying approval to use specific resources
ciphertext
granting or denying approval to use specific resources
keystream
granting or denying approval to use specific resources
access control
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
plaintext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
man-in-the-middle
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
denial of service
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
weak keys
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
decryption
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
RF jamming
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
evil twin
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
ciphertext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
keystream
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
access control
an attack that makes it appear that the wireless device and the network computers are communicating with each other
plaintext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
man-in-the-middle
an attack that makes it appear that the wireless device and the network computers are communicating with each other
denial of service
an attack that makes it appear that the wireless device and the network computers are communicating with each other
weak keys
an attack that makes it appear that the wireless device and the network computers are communicating with each other
decryption
an attack that makes it appear that the wireless device and the network computers are communicating with each other
RF jamming
an attack that makes it appear that the wireless device and the network computers are communicating with each other
evil twin
an attack that makes it appear that the wireless device and the network computers are communicating with each other
ciphertext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
keystream
an attack that makes it appear that the wireless device and the network computers are communicating with each other
access control
cryptographic keys that create a repeating pattern
plaintext
cryptographic keys that create a repeating pattern
man-in-the-middle
cryptographic keys that create a repeating pattern
denial of service
cryptographic keys that create a repeating pattern
weak keys
cryptographic keys that create a repeating pattern
decryption
cryptographic keys that create a repeating pattern
RF jamming
cryptographic keys that create a repeating pattern
evil twin
cryptographic keys that create a repeating pattern
ciphertext
cryptographic keys that create a repeating pattern
keystream
cryptographic keys that create a repeating pattern
access control
the output from a pseudo-random number generator (PRNG)
plaintext
the output from a pseudo-random number generator (PRNG)
man-in-the-middle
the output from a pseudo-random number generator (PRNG)
denial of service
the output from a pseudo-random number generator (PRNG)
weak keys
the output from a pseudo-random number generator (PRNG)
decryption
the output from a pseudo-random number generator (PRNG)
RF jamming
the output from a pseudo-random number generator (PRNG)
evil twin
the output from a pseudo-random number generator (PRNG)
ciphertext
the output from a pseudo-random number generator (PRNG)
keystream
the output from a pseudo-random number generator (PRNG)
access control
an attack that attempts to prevent a device from performing its normal functions
plaintext
an attack that attempts to prevent a device from performing its normal functions
man-in-the-middle
an attack that attempts to prevent a device from performing its normal functions
denial of service
an attack that attempts to prevent a device from performing its normal functions
weak keys
an attack that attempts to prevent a device from performing its normal functions
decryption
an attack that attempts to prevent a device from performing its normal functions
RF jamming
an attack that attempts to prevent a device from performing its normal functions
evil twin
an attack that attempts to prevent a device from performing its normal functions
ciphertext
an attack that attempts to prevent a device from performing its normal functions
keystream
an attack that attempts to prevent a device from performing its normal functions
access control
data input into an encryption algorithm
plaintext
data input into an encryption algorithm
man-in-the-middle
data input into an encryption algorithm
denial of service
data input into an encryption algorithm
weak keys
data input into an encryption algorithm
decryption
data input into an encryption algorithm
RF jamming
data input into an encryption algorithm
evil twin
data input into an encryption algorithm
ciphertext
data input into an encryption algorithm
keystream
data input into an encryption algorithm
access control
the process of changing ciphertext into plaintext
plaintext
the process of changing ciphertext into plaintext
man-in-the-middle
the process of changing ciphertext into plaintext
denial of service
the process of changing ciphertext into plaintext
weak keys
the process of changing ciphertext into plaintext
decryption
the process of changing ciphertext into plaintext
RF jamming
the process of changing ciphertext into plaintext
evil twin
the process of changing ciphertext into plaintext
ciphertext
the process of changing ciphertext into plaintext
keystream
the process of changing ciphertext into plaintext
access control
data that has been encrypted
plaintext
data that has been encrypted
man-in-the-middle
data that has been encrypted
denial of service
data that has been encrypted
weak keys
data that has been encrypted
decryption
data that has been encrypted
RF jamming
data that has been encrypted
evil twin
data that has been encrypted
ciphertext
data that has been encrypted
keystream
data that has been encrypted
access control
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Wireless LAN Security Vulnerabilities
1
A WLAN can contain many entry points,making security more difficult than with a wired LAN.
True
2
Searching for unprotected wireless networks is called what?

A) WLAN trolling
B) war driving
C) battle testing
D) wireless fishing
B
3
____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
A
4
Which of the following is NOT an information security layer?

A) products
B) people
C) prevention
D) procedures
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?

A) inserting network traffic
B) denial of service
C) hijacking the wireless connection
D) reading data
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ attack on WEP involves identifying two packets derived from the same IV.

A) capture
B) keystream
C) weak key
D) pseudo-random number
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
With WEP,it is impossible for an attacker to identify two packets derived from the same initialization vector.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) availability
B) cost
C) security
D) complexity
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
WEP guards one of the CIA characteristics,namely what?

A) integrity
B) availability
C) confidentiality
D) access control
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Cleartext that has been encrypted is referred to as which of the following?

A) plaintext
B) cryptography
C) ciphertext
D) keytext
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Wireless security was implemented well in the original 802.11 standard.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
A user needs to enter the service set identifier manually when which weak security measure is employed?

A) WEP encryption
B) Open System Authentication
C) SSID hiding
D) shared key authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Attacks that use many computers to attack a single network are called centralized attacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?

A) NIC blocking
B) MAC address filtering
C) Network blocking
D) IP address filtering
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
A key that creates a detectable pattern is referred to as which of the following?

A) repeating key
B) plain key
C) weak key
D) crypto key
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which is true about WEP?

A) uses a shared secret key
B) uses a public/private key pair
C) two keys are maintained
D) must be at least 32 bits in length
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
A rogue AP can be described as which of the following?

A) an AP whose security settings have not been set
B) an AP designed to mimic an authorized AP
C) an AP that has malfunctioned and allows unauthorized users to access it
D) an unauthorized AP brought into the enterprise network
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
An attacker spoofs frames to prevent a client from remaining connected to the WLAN.What type of an attack is this?

A) RF jamming
B) man-in-the-middle
C) hijacking
D) denial of service
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)

A) only Windows uses MAC addresses,excluding other OSs from this method
B) MAC addresses can be spoofed
C) the MAC address can be captured by forcing a reassociation
D) MAC address management can be difficult
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Briefly define cryptography.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Describe one weakness of MAC address filtering.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What is a distributed attack?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Describe how an attacker can hijack a wireless connection.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Describe the five steps in the process of WEP encryption.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
List and describe the three characteristics of information that must be protected by information security?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
The three protections that must be extended over information can be described by the acronym ________.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Describe three limitations of SSID hiding.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
How have WLANs changed 'hard edges' into 'blurred edges'?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following are difficulties faced in defending attacks? (Choose all that apply.)

A) universally connected devices
B) operating system vendor's lack of concern about security
C) increased speed of attacks
D) attacks that are more complex
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ ensures that no unauthorized person or software has altered the information.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)

A) efficient
B) self-synchronizing
C) mandatory
D) exclusive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
WEP protects _______________ by scrambling the wireless data as it is transmitted.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Describe open system authentication.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Wireless access control is intended to limit a user's admission to the _______.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
What three categories can the protections implemented in the original 802.11 standard be divided into? (Choose three.)

A) access control
B) MAC address filtering
C) wired equivalent privacy
D) authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Describe war driving.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
an imposter AP that is set up by an attacker
plaintext
an imposter AP that is set up by an attacker
man-in-the-middle
an imposter AP that is set up by an attacker
denial of service
an imposter AP that is set up by an attacker
weak keys
an imposter AP that is set up by an attacker
decryption
an imposter AP that is set up by an attacker
RF jamming
an imposter AP that is set up by an attacker
evil twin
an imposter AP that is set up by an attacker
ciphertext
an imposter AP that is set up by an attacker
keystream
an imposter AP that is set up by an attacker
access control
granting or denying approval to use specific resources
plaintext
granting or denying approval to use specific resources
man-in-the-middle
granting or denying approval to use specific resources
denial of service
granting or denying approval to use specific resources
weak keys
granting or denying approval to use specific resources
decryption
granting or denying approval to use specific resources
RF jamming
granting or denying approval to use specific resources
evil twin
granting or denying approval to use specific resources
ciphertext
granting or denying approval to use specific resources
keystream
granting or denying approval to use specific resources
access control
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
plaintext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
man-in-the-middle
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
denial of service
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
weak keys
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
decryption
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
RF jamming
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
evil twin
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
ciphertext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
keystream
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
access control
an attack that makes it appear that the wireless device and the network computers are communicating with each other
plaintext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
man-in-the-middle
an attack that makes it appear that the wireless device and the network computers are communicating with each other
denial of service
an attack that makes it appear that the wireless device and the network computers are communicating with each other
weak keys
an attack that makes it appear that the wireless device and the network computers are communicating with each other
decryption
an attack that makes it appear that the wireless device and the network computers are communicating with each other
RF jamming
an attack that makes it appear that the wireless device and the network computers are communicating with each other
evil twin
an attack that makes it appear that the wireless device and the network computers are communicating with each other
ciphertext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
keystream
an attack that makes it appear that the wireless device and the network computers are communicating with each other
access control
cryptographic keys that create a repeating pattern
plaintext
cryptographic keys that create a repeating pattern
man-in-the-middle
cryptographic keys that create a repeating pattern
denial of service
cryptographic keys that create a repeating pattern
weak keys
cryptographic keys that create a repeating pattern
decryption
cryptographic keys that create a repeating pattern
RF jamming
cryptographic keys that create a repeating pattern
evil twin
cryptographic keys that create a repeating pattern
ciphertext
cryptographic keys that create a repeating pattern
keystream
cryptographic keys that create a repeating pattern
access control
the output from a pseudo-random number generator (PRNG)
plaintext
the output from a pseudo-random number generator (PRNG)
man-in-the-middle
the output from a pseudo-random number generator (PRNG)
denial of service
the output from a pseudo-random number generator (PRNG)
weak keys
the output from a pseudo-random number generator (PRNG)
decryption
the output from a pseudo-random number generator (PRNG)
RF jamming
the output from a pseudo-random number generator (PRNG)
evil twin
the output from a pseudo-random number generator (PRNG)
ciphertext
the output from a pseudo-random number generator (PRNG)
keystream
the output from a pseudo-random number generator (PRNG)
access control
an attack that attempts to prevent a device from performing its normal functions
plaintext
an attack that attempts to prevent a device from performing its normal functions
man-in-the-middle
an attack that attempts to prevent a device from performing its normal functions
denial of service
an attack that attempts to prevent a device from performing its normal functions
weak keys
an attack that attempts to prevent a device from performing its normal functions
decryption
an attack that attempts to prevent a device from performing its normal functions
RF jamming
an attack that attempts to prevent a device from performing its normal functions
evil twin
an attack that attempts to prevent a device from performing its normal functions
ciphertext
an attack that attempts to prevent a device from performing its normal functions
keystream
an attack that attempts to prevent a device from performing its normal functions
access control
data input into an encryption algorithm
plaintext
data input into an encryption algorithm
man-in-the-middle
data input into an encryption algorithm
denial of service
data input into an encryption algorithm
weak keys
data input into an encryption algorithm
decryption
data input into an encryption algorithm
RF jamming
data input into an encryption algorithm
evil twin
data input into an encryption algorithm
ciphertext
data input into an encryption algorithm
keystream
data input into an encryption algorithm
access control
the process of changing ciphertext into plaintext
plaintext
the process of changing ciphertext into plaintext
man-in-the-middle
the process of changing ciphertext into plaintext
denial of service
the process of changing ciphertext into plaintext
weak keys
the process of changing ciphertext into plaintext
decryption
the process of changing ciphertext into plaintext
RF jamming
the process of changing ciphertext into plaintext
evil twin
the process of changing ciphertext into plaintext
ciphertext
the process of changing ciphertext into plaintext
keystream
the process of changing ciphertext into plaintext
access control
data that has been encrypted
plaintext
data that has been encrypted
man-in-the-middle
data that has been encrypted
denial of service
data that has been encrypted
weak keys
data that has been encrypted
decryption
data that has been encrypted
RF jamming
data that has been encrypted
evil twin
data that has been encrypted
ciphertext
data that has been encrypted
keystream
data that has been encrypted
access control
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.