Deck 8: Wireless LAN Security and Vulnerabilities

Full screen (f)
exit full mode
Question
RC4 is a ____ cipher that accepts keys up to 128 bits in length.

A) stream
B) key
C) cyclic
D) logical
Use Space or
up arrow
down arrow
to flip the card.
Question
In WEP, the CRC generates a(n) ____ based on the contents of the text.

A) initialization vector
B) cipher
C) checksum
D) key
Question
MAC address filtering ____.

A) is difficult to implement
B) requires pre-approved authentication
C) is expensive
D) does not work well
Question
Which aspect of information security does WEP protect?

A) availability
B) integrity
C) confidentiality
D) All of the above
Question
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.

A) plaintext
B) detext
C) ciphertext
D) deciphertext
Question
According to the IEEE 802.11 cryptography objectives, how strong should WEP be?

A) difficult
B) reasonably
C) extremely
D) unbreakable
Question
In a brute force attack, what key combination would follow 00001?

A) 00000
B) 00002
C) 00010
D) 10000
Question
Which type of attacker typically has a high skill level?

A) hacker
B) cracker
C) spy
D) All of the above
Question
A WEP key can be a passphrase created by entering ____ ASCII characters.

A) 3
B) 7
C) 10
D) 16
Question
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
Question
____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
Question
Wireless DoS attacks are exactly the same as wired DoS attacks.
Question
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) speed
B) cost
C) security
D) complexity
Question
A ____ is not malicious but often seeks to expose security flaws.

A) cracker
B) script kiddie
C) spy
D) hacker
Question
Cryptography is a new invention of the 20th Century.
Question
Information security involves more than protecting the information itself.
Question
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

A) Computer Emergency Response Team Coordination Center (CERT/CC)
B) InfraGard
C) National Security Institute (NSI)
D) SysAdmin, Audit, Network, Security (SANS) Institute
Question
Which characteristic of information is guarded by access control?

A) availability
B) integrity
C) confidentiality
D) robustness
Question
____ is another name for open systems authentication.

A) Public key encryption
B) Symmetric key encryption
C) WEP
D) SSID filtering
Question
Employees pose only a small threat to networks.
Question
What is a cracker?
Question
A ____ attack on WEP involves viewing collisions to derive plaintext values.

A) capture
B) keystream
C) weak key
D) pseudo-random number
Question
Describe one trend that is making security increasingly difficult.
Question
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Question
A standard personal computer can easily create over ____ possible password combinations per second.

A) 100
B) 1,000
C) 1,000,000
D) 1,000,000,000
Question
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.

A) disassociation
B) drop
C) misaddressed
D) incomplete
Question
In a 64-bit packet sent using WEP, how many bits are actually encrypted?

A) 10
B) 24
C) 40
D) 64
Question
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.

A) spoof
B) break
C) modify
D) disable
Question
Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.
Question
Briefly describe the goal of InfraGard.
Question
Describe at least four weaknesses of open system authentication.
Question
Describe the five steps in the process of WEP encryption.
Question
The term _________________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Question
In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.
Question
What are the three characteristics of information that must be protected by information security?
Question
On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Question
Describe open system authentication.
Question
Briefly describe cryptography and discuss its history.
Question
Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information.
Question
Describe a man-in-the-middle attack.
Question
What is a dictionary attack?
Question
Match between columns
attacker floods the radio frequency spectrum with noise
filter
attacker floods the radio frequency spectrum with noise
hacker
attacker floods the radio frequency spectrum with noise
default key
attacker floods the radio frequency spectrum with noise
cipher
attacker floods the radio frequency spectrum with noise
cracker
attacker floods the radio frequency spectrum with noise
jam
attacker floods the radio frequency spectrum with noise
script kiddies
attacker floods the radio frequency spectrum with noise
keystream
attacker floods the radio frequency spectrum with noise
computer spy
person who has been hired to break into a computer and steal information
filter
person who has been hired to break into a computer and steal information
hacker
person who has been hired to break into a computer and steal information
default key
person who has been hired to break into a computer and steal information
cipher
person who has been hired to break into a computer and steal information
cracker
person who has been hired to break into a computer and steal information
jam
person who has been hired to break into a computer and steal information
script kiddies
person who has been hired to break into a computer and steal information
keystream
person who has been hired to break into a computer and steal information
computer spy
series of 1's and 0's equal in length to the text plus the ICV
filter
series of 1's and 0's equal in length to the text plus the ICV
hacker
series of 1's and 0's equal in length to the text plus the ICV
default key
series of 1's and 0's equal in length to the text plus the ICV
cipher
series of 1's and 0's equal in length to the text plus the ICV
cracker
series of 1's and 0's equal in length to the text plus the ICV
jam
series of 1's and 0's equal in length to the text plus the ICV
script kiddies
series of 1's and 0's equal in length to the text plus the ICV
keystream
series of 1's and 0's equal in length to the text plus the ICV
computer spy
key value that is used to encrypt wireless data transmissions when they are sent
filter
key value that is used to encrypt wireless data transmissions when they are sent
hacker
key value that is used to encrypt wireless data transmissions when they are sent
default key
key value that is used to encrypt wireless data transmissions when they are sent
cipher
key value that is used to encrypt wireless data transmissions when they are sent
cracker
key value that is used to encrypt wireless data transmissions when they are sent
jam
key value that is used to encrypt wireless data transmissions when they are sent
script kiddies
key value that is used to encrypt wireless data transmissions when they are sent
keystream
key value that is used to encrypt wireless data transmissions when they are sent
computer spy
person who violates system security with malicious intent
filter
person who violates system security with malicious intent
hacker
person who violates system security with malicious intent
default key
person who violates system security with malicious intent
cipher
person who violates system security with malicious intent
cracker
person who violates system security with malicious intent
jam
person who violates system security with malicious intent
script kiddies
person who violates system security with malicious intent
keystream
person who violates system security with malicious intent
computer spy
encryption algorithm
filter
encryption algorithm
hacker
encryption algorithm
default key
encryption algorithm
cipher
encryption algorithm
cracker
encryption algorithm
jam
encryption algorithm
script kiddies
encryption algorithm
keystream
encryption algorithm
computer spy
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
filter
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
hacker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
default key
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cipher
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cracker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
jam
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
script kiddies
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
keystream
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
computer spy
limit a user's admission to the access point
filter
limit a user's admission to the access point
hacker
limit a user's admission to the access point
default key
limit a user's admission to the access point
cipher
limit a user's admission to the access point
cracker
limit a user's admission to the access point
jam
limit a user's admission to the access point
script kiddies
limit a user's admission to the access point
keystream
limit a user's admission to the access point
computer spy
unskilled or novice users who break into computer systems with malicious intent
filter
unskilled or novice users who break into computer systems with malicious intent
hacker
unskilled or novice users who break into computer systems with malicious intent
default key
unskilled or novice users who break into computer systems with malicious intent
cipher
unskilled or novice users who break into computer systems with malicious intent
cracker
unskilled or novice users who break into computer systems with malicious intent
jam
unskilled or novice users who break into computer systems with malicious intent
script kiddies
unskilled or novice users who break into computer systems with malicious intent
keystream
unskilled or novice users who break into computer systems with malicious intent
computer spy
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Wireless LAN Security and Vulnerabilities
1
RC4 is a ____ cipher that accepts keys up to 128 bits in length.

A) stream
B) key
C) cyclic
D) logical
A
2
In WEP, the CRC generates a(n) ____ based on the contents of the text.

A) initialization vector
B) cipher
C) checksum
D) key
C
3
MAC address filtering ____.

A) is difficult to implement
B) requires pre-approved authentication
C) is expensive
D) does not work well
B
4
Which aspect of information security does WEP protect?

A) availability
B) integrity
C) confidentiality
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.

A) plaintext
B) detext
C) ciphertext
D) deciphertext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
According to the IEEE 802.11 cryptography objectives, how strong should WEP be?

A) difficult
B) reasonably
C) extremely
D) unbreakable
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
In a brute force attack, what key combination would follow 00001?

A) 00000
B) 00002
C) 00010
D) 10000
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Which type of attacker typically has a high skill level?

A) hacker
B) cracker
C) spy
D) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
A WEP key can be a passphrase created by entering ____ ASCII characters.

A) 3
B) 7
C) 10
D) 16
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Wireless DoS attacks are exactly the same as wired DoS attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) speed
B) cost
C) security
D) complexity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ is not malicious but often seeks to expose security flaws.

A) cracker
B) script kiddie
C) spy
D) hacker
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Cryptography is a new invention of the 20th Century.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Information security involves more than protecting the information itself.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

A) Computer Emergency Response Team Coordination Center (CERT/CC)
B) InfraGard
C) National Security Institute (NSI)
D) SysAdmin, Audit, Network, Security (SANS) Institute
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Which characteristic of information is guarded by access control?

A) availability
B) integrity
C) confidentiality
D) robustness
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is another name for open systems authentication.

A) Public key encryption
B) Symmetric key encryption
C) WEP
D) SSID filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Employees pose only a small threat to networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What is a cracker?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ attack on WEP involves viewing collisions to derive plaintext values.

A) capture
B) keystream
C) weak key
D) pseudo-random number
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Describe one trend that is making security increasingly difficult.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A standard personal computer can easily create over ____ possible password combinations per second.

A) 100
B) 1,000
C) 1,000,000
D) 1,000,000,000
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.

A) disassociation
B) drop
C) misaddressed
D) incomplete
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
In a 64-bit packet sent using WEP, how many bits are actually encrypted?

A) 10
B) 24
C) 40
D) 64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.

A) spoof
B) break
C) modify
D) disable
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly describe the goal of InfraGard.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Describe at least four weaknesses of open system authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Describe the five steps in the process of WEP encryption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The term _________________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the three characteristics of information that must be protected by information security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe open system authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly describe cryptography and discuss its history.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe a man-in-the-middle attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What is a dictionary attack?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
attacker floods the radio frequency spectrum with noise
filter
attacker floods the radio frequency spectrum with noise
hacker
attacker floods the radio frequency spectrum with noise
default key
attacker floods the radio frequency spectrum with noise
cipher
attacker floods the radio frequency spectrum with noise
cracker
attacker floods the radio frequency spectrum with noise
jam
attacker floods the radio frequency spectrum with noise
script kiddies
attacker floods the radio frequency spectrum with noise
keystream
attacker floods the radio frequency spectrum with noise
computer spy
person who has been hired to break into a computer and steal information
filter
person who has been hired to break into a computer and steal information
hacker
person who has been hired to break into a computer and steal information
default key
person who has been hired to break into a computer and steal information
cipher
person who has been hired to break into a computer and steal information
cracker
person who has been hired to break into a computer and steal information
jam
person who has been hired to break into a computer and steal information
script kiddies
person who has been hired to break into a computer and steal information
keystream
person who has been hired to break into a computer and steal information
computer spy
series of 1's and 0's equal in length to the text plus the ICV
filter
series of 1's and 0's equal in length to the text plus the ICV
hacker
series of 1's and 0's equal in length to the text plus the ICV
default key
series of 1's and 0's equal in length to the text plus the ICV
cipher
series of 1's and 0's equal in length to the text plus the ICV
cracker
series of 1's and 0's equal in length to the text plus the ICV
jam
series of 1's and 0's equal in length to the text plus the ICV
script kiddies
series of 1's and 0's equal in length to the text plus the ICV
keystream
series of 1's and 0's equal in length to the text plus the ICV
computer spy
key value that is used to encrypt wireless data transmissions when they are sent
filter
key value that is used to encrypt wireless data transmissions when they are sent
hacker
key value that is used to encrypt wireless data transmissions when they are sent
default key
key value that is used to encrypt wireless data transmissions when they are sent
cipher
key value that is used to encrypt wireless data transmissions when they are sent
cracker
key value that is used to encrypt wireless data transmissions when they are sent
jam
key value that is used to encrypt wireless data transmissions when they are sent
script kiddies
key value that is used to encrypt wireless data transmissions when they are sent
keystream
key value that is used to encrypt wireless data transmissions when they are sent
computer spy
person who violates system security with malicious intent
filter
person who violates system security with malicious intent
hacker
person who violates system security with malicious intent
default key
person who violates system security with malicious intent
cipher
person who violates system security with malicious intent
cracker
person who violates system security with malicious intent
jam
person who violates system security with malicious intent
script kiddies
person who violates system security with malicious intent
keystream
person who violates system security with malicious intent
computer spy
encryption algorithm
filter
encryption algorithm
hacker
encryption algorithm
default key
encryption algorithm
cipher
encryption algorithm
cracker
encryption algorithm
jam
encryption algorithm
script kiddies
encryption algorithm
keystream
encryption algorithm
computer spy
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
filter
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
hacker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
default key
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cipher
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
cracker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
jam
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
script kiddies
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
keystream
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
computer spy
limit a user's admission to the access point
filter
limit a user's admission to the access point
hacker
limit a user's admission to the access point
default key
limit a user's admission to the access point
cipher
limit a user's admission to the access point
cracker
limit a user's admission to the access point
jam
limit a user's admission to the access point
script kiddies
limit a user's admission to the access point
keystream
limit a user's admission to the access point
computer spy
unskilled or novice users who break into computer systems with malicious intent
filter
unskilled or novice users who break into computer systems with malicious intent
hacker
unskilled or novice users who break into computer systems with malicious intent
default key
unskilled or novice users who break into computer systems with malicious intent
cipher
unskilled or novice users who break into computer systems with malicious intent
cracker
unskilled or novice users who break into computer systems with malicious intent
jam
unskilled or novice users who break into computer systems with malicious intent
script kiddies
unskilled or novice users who break into computer systems with malicious intent
keystream
unskilled or novice users who break into computer systems with malicious intent
computer spy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.