Deck 11: Hacking Wireless Networks

Full screen (f)
exit full mode
Question
The ____ band is used by commercial AM radio stations.

A)extremely low frequency (ELF)
B)very low frequency (VLF)
C)medium frequency (MF)
D)high frequency (HF)
Use Space or
up arrow
down arrow
to flip the card.
Question
One of the default SSIDs used by D-Link is ____.

A)Tsunami
B)Wireless
C)default
D)linksys
Question
CSMA/CD is used at the data link layer on wireless networks.
Question
Wireless routers are designed so that they do not interfere with wireless telephones.
Question
A(n) ____ is a transceiver that connects to a network via an Ethernet cable; it bridges the wireless LAN with the wired network.

A)wireless network interface card (WNIC)
B)switch
C)router
D)access point (AP)
Question
The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.

A)802.11a
B)802.11b
C)802.11e
D)802.11g
Question
Each frequency band contains ____; if they overlap, interference could occur.

A)SSIDs
B)guard bands
C)cycles
D)channels
Question
One of the default SSIDs used by Linksys is ____.

A)Tsunami
B)WLAN
C)default
D)linksys
Question
In 802.11, an addressable unit is called a ____.

A)host
B)Data Terminal Equipment (DTE)
C)station (STA)
D)wireless NIC (WNIC)
Question
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the ____.

A)Network Link layer
B)Data Link layer
C)transport layer
D)session layer
Question
____ defines how data is placed on a carrier signal.

A)Modulation
B)Multiplexing
C)Digitization
D)Adaptation
Question
There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
Question
The default SSID used by Cisco is ____.

A)Tsunami
B)WLAN
C)default
D)linksys
Question
It's possible to have a wireless network that doesn't connect to a wired network.
Question
In a WPAN, the maximum distance allowed between each device is usually ____ meters.

A)5
B)10
C)15
D)20
Question
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
Question
The ____ standard has improvements to address the problem of interference.

A)802.11a
B)802.11b
C)802.11e
D)802.11g
Question
____ Project 802 was developed to create LAN and WAN standards.

A)IEEE
B)EIA/TIA
C)ISO
D)ITU-T
Question
The ____ standard can achieve a throughput of 54 Mbps.

A)802.11b
B)802.11e
C)802.11g
D)802.11i
Question
____ is the most popular type of WLAN technology.

A)Infrared (IR)
B)Narrowband
C)Spread spectrum
D)Microwave
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
data is spread across a large-frequency bandwidth instead of traveling across just one frequency band
Question
WEP stands for _________________________.
Question
____ uses TLS to authenticate the server to the client but not the client to the server.

A)PPP
B)EAP
C)EAP-TLS
D)PEAP
Question
____ is a product for conducting wardriving attacks written by Mike Kershaw. This product is free and runs on Linux, BSD, Mac OS X, and even Linux PDAs.

A)NetStumbler
B)Kismet
C)Wardriver
D)AirSnort
Question
The first wireless technology standard, ____________________, defined the specifications for wireless connectivity at 1 Mbps and 2 Mbps in a LAN.
Question
In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.

A)host
B)supplicant
C)authenticator
D)authentication server
Question
A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.
Question
WPA improves encryption by using ____.

A)WEP
B)TKIP
C)802.1X
D)RADIUS
Question
______________________________ is specified in the 802.11i standard and corrected many security vulnerabilities in 802.11b.
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
this technology is restricted to a single room or line of sight
Question
____ is an enhancement to PPP.

A)EAP
B)WEP
C)WPA
D)802.1X
Question
____ is a freeware tool written for Windows that enables you to detect WLANs using 802.11a, 802.11b, and 802.11g.

A)NetStumbler
B)Kismet
C)Wardriver
D)AirSnort
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
uses GFSK modulation
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
uses microwave radio band frequencies to transmit data
Question
____ is the tool most hackers wanting to access WEP-enabled WLANs use.

A)NetStumbler
B)Kismet
C)Wardriver
D)AirCrack NG
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
European WLAN standard
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
addresses the issue of wireless metropolitan area networks (MANs)
Question
In the 802.11 standard, a mobile station is defined as a station that accesses the LAN while moving; a(n) ____________________ station is one that can move from location to location, but is used only while in a fixed location.
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
uses DSSS modulation
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
addresses wireless MANs for mobile users who are sitting in trains, subways, or cars
Question
What is the role of a WNIC?
Question
What is wardriving?
Question
What is a certificate?
Question
What is the function of a WG of the IEEE?
Question
What is frequency-hopping spread spectrum (FHSS)?
Question
In 802.1X, what is an authentication server?
Question
What is the IEEE 802.15 standard?
Question
What is PPP?
Question
What is a basic service set (BSS)?
Question
What is WEP? Is it a good way to secure wireless networks?
Question
What are the basic components of a wireless network?
Question
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
defines the process of authenticating and authorizing users on a network
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/52
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Hacking Wireless Networks
1
The ____ band is used by commercial AM radio stations.

A)extremely low frequency (ELF)
B)very low frequency (VLF)
C)medium frequency (MF)
D)high frequency (HF)
C
2
One of the default SSIDs used by D-Link is ____.

A)Tsunami
B)Wireless
C)default
D)linksys
C
3
CSMA/CD is used at the data link layer on wireless networks.
False
4
Wireless routers are designed so that they do not interfere with wireless telephones.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is a transceiver that connects to a network via an Ethernet cable; it bridges the wireless LAN with the wired network.

A)wireless network interface card (WNIC)
B)switch
C)router
D)access point (AP)
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.

A)802.11a
B)802.11b
C)802.11e
D)802.11g
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
7
Each frequency band contains ____; if they overlap, interference could occur.

A)SSIDs
B)guard bands
C)cycles
D)channels
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
8
One of the default SSIDs used by Linksys is ____.

A)Tsunami
B)WLAN
C)default
D)linksys
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
9
In 802.11, an addressable unit is called a ____.

A)host
B)Data Terminal Equipment (DTE)
C)station (STA)
D)wireless NIC (WNIC)
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
10
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the ____.

A)Network Link layer
B)Data Link layer
C)transport layer
D)session layer
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
11
____ defines how data is placed on a carrier signal.

A)Modulation
B)Multiplexing
C)Digitization
D)Adaptation
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
12
There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
13
The default SSID used by Cisco is ____.

A)Tsunami
B)WLAN
C)default
D)linksys
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
14
It's possible to have a wireless network that doesn't connect to a wired network.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
15
In a WPAN, the maximum distance allowed between each device is usually ____ meters.

A)5
B)10
C)15
D)20
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
16
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ standard has improvements to address the problem of interference.

A)802.11a
B)802.11b
C)802.11e
D)802.11g
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
18
____ Project 802 was developed to create LAN and WAN standards.

A)IEEE
B)EIA/TIA
C)ISO
D)ITU-T
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ standard can achieve a throughput of 54 Mbps.

A)802.11b
B)802.11e
C)802.11g
D)802.11i
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
20
____ is the most popular type of WLAN technology.

A)Infrared (IR)
B)Narrowband
C)Spread spectrum
D)Microwave
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
data is spread across a large-frequency bandwidth instead of traveling across just one frequency band
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
22
WEP stands for _________________________.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
23
____ uses TLS to authenticate the server to the client but not the client to the server.

A)PPP
B)EAP
C)EAP-TLS
D)PEAP
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
24
____ is a product for conducting wardriving attacks written by Mike Kershaw. This product is free and runs on Linux, BSD, Mac OS X, and even Linux PDAs.

A)NetStumbler
B)Kismet
C)Wardriver
D)AirSnort
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
25
The first wireless technology standard, ____________________, defined the specifications for wireless connectivity at 1 Mbps and 2 Mbps in a LAN.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
26
In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.

A)host
B)supplicant
C)authenticator
D)authentication server
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
28
WPA improves encryption by using ____.

A)WEP
B)TKIP
C)802.1X
D)RADIUS
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
29
______________________________ is specified in the 802.11i standard and corrected many security vulnerabilities in 802.11b.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
this technology is restricted to a single room or line of sight
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
31
____ is an enhancement to PPP.

A)EAP
B)WEP
C)WPA
D)802.1X
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
32
____ is a freeware tool written for Windows that enables you to detect WLANs using 802.11a, 802.11b, and 802.11g.

A)NetStumbler
B)Kismet
C)Wardriver
D)AirSnort
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
uses GFSK modulation
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
uses microwave radio band frequencies to transmit data
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
35
____ is the tool most hackers wanting to access WEP-enabled WLANs use.

A)NetStumbler
B)Kismet
C)Wardriver
D)AirCrack NG
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
European WLAN standard
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
addresses the issue of wireless metropolitan area networks (MANs)
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
38
In the 802.11 standard, a mobile station is defined as a station that accesses the LAN while moving; a(n) ____________________ station is one that can move from location to location, but is used only while in a fixed location.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
39
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
uses DSSS modulation
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
addresses wireless MANs for mobile users who are sitting in trains, subways, or cars
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
41
What is the role of a WNIC?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
42
What is wardriving?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
43
What is a certificate?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
44
What is the function of a WG of the IEEE?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
45
What is frequency-hopping spread spectrum (FHSS)?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
46
In 802.1X, what is an authentication server?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
47
What is the IEEE 802.15 standard?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
48
What is PPP?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
49
What is a basic service set (BSS)?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
50
What is WEP? Is it a good way to secure wireless networks?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
51
What are the basic components of a wireless network?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
52
MATCHING
Match each term with the correct statement below.
a.802.16
f.infrared (IR)
b.spread spectrum
g.802.1X
c.802.11b
h.Bluetooth
d.narrowband
i.HiperLAN2
e.802.20
defines the process of authenticating and authorizing users on a network
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 52 flashcards in this deck.