Deck 2: Wireless LAN Vulnerabilities

ملء الشاشة (f)
exit full mode
سؤال
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A) social engineering
B) brute force
C) dictionary
D) birthday
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
سؤال
The SSID can be easily discovered even when it is not contained in beacon frames.
سؤال
At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.

A) association request frame
B) CRC
C) ICV
D) beacon frame
سؤال
Deploying dynamic WEP is a very expensive solution that involves a lot of effort.
سؤال
A stream cipher takes one character and replaces it with another character. This output is known as the ____.

A) initialization vector
B) integrity check value
C) cyclic redundancy check
D) keystream
سؤال
With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.

A) active
B) passive
C) interactive
D) moving
سؤال
Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A) confidentiality
B) integrity
C) availability
D) non-repudiation
سؤال
In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.

A) social engineering
B) brute force
C) dictionary
D) birthday
سؤال
____ requires the wireless device (and not the user) to be authenticated prior to being connected to the network.

A) SSID
B) Wireless authentication
C) Wired confidentiality
D) Wireless availability
سؤال
WEP relies on a secret key shared between a wireless client device and the access point.
سؤال
In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

A) public key cryptography
B) asymmetric encryption
C) asymmetric cryptography
D) private key cryptography
سؤال
To encrypt packets WEP can use only a 64-bit or ____-bit number.

A) 72
B) 90
C) 110
D) 128
سؤال
Changing the original text to a secret message using cryptography is known as ____.

A) ciphertext
B) decryption
C) encryption
D) plaintext
سؤال
Access control is intended to guard the ____ of information by making it accessible only to authorized users.

A) confidentiality
B) availability
C) integrity
D) non-repudiation
سؤال
When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.
سؤال
The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.

A) SSID broadcast
B) handoff
C) roaming
D) scanning
سؤال
In WEP, the ____ is a cyclic redundancy check (CRC) value calculated with a checksum based on the contents of the text.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
سؤال
Wireless access control through MAC address filtering is the same as access restrictions.
سؤال
A(n) ____ carries information about the data rates that a device can support along with the Service Set Identifier (SSID) of the network it wants to join.

A) association request frame
B) CRC
C) PRNG
D) ICV
سؤال
Describe the main characteristics of the shared key authentication method.
سؤال
What are some of the tools used to perform WEP attacks?
سؤال
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
سؤال
What is a MAC address?
سؤال
Describe the main characteristics of the open system authentication method.
سؤال
Briefly explain how WEP implementation violates the cardinal rule of cryptography: anything that creates a detectable pattern must be avoided.
سؤال
A(n) ____________________ acts as the central base station for the wireless network.
سؤال
In WEP, RC4 uses a(n) ____________________ to create the keystream.
سؤال
____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

A) Kerberos
B) Dynamic WEP
C) WEP2
D) LDAP
سؤال
The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.
سؤال
____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.

A) WEP2
B) Dynamic WEP
C) SSID
D) Roaming
سؤال
Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.
سؤال
WEP2 uses a different authentication system known as ____.

A) RADIUS
B) MS-CHAPS
C) LDAP
D) Kerberos
سؤال
Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).

A) collision
B) keystream
C) ICV
D) CRC vector
سؤال
What are the options for creating keys in WEP?
سؤال
What was the criteria used by the IEEE 802.11 committee to design WEP?
سؤال
____ traffic is traffic sent to all users on the network.

A) Unicast
B) Broadcast
C) Singlecast
D) Multicast
سؤال
____ traffic is traffic destined for only one address.

A) Severalcast
B) Multicast
C) Unicast
D) Broadcast
سؤال
A wireless device is set to look for beacon frames from the AP. This is known as ____________________.
سؤال
What are the differences between Dynamic WEP unicast and broadcast keys?
سؤال
What are the main characteristics of Kerberos?
سؤال
Match between columns
adds two new security enhancements to WEP.
SSID
adds two new security enhancements to WEP.
RC4
adds two new security enhancements to WEP.
Cipher
adds two new security enhancements to WEP.
AirSnort
adds two new security enhancements to WEP.
Access restrictions
adds two new security enhancements to WEP.
Shoulder surfing
adds two new security enhancements to WEP.
WEP2
adds two new security enhancements to WEP.
Keystream attack
adds two new security enhancements to WEP.
Access control
the "network name" for the wireless network.
SSID
the "network name" for the wireless network.
RC4
the "network name" for the wireless network.
Cipher
the "network name" for the wireless network.
AirSnort
the "network name" for the wireless network.
Access restrictions
the "network name" for the wireless network.
Shoulder surfing
the "network name" for the wireless network.
WEP2
the "network name" for the wireless network.
Keystream attack
the "network name" for the wireless network.
Access control
an encryption algorithm.
SSID
an encryption algorithm.
RC4
an encryption algorithm.
Cipher
an encryption algorithm.
AirSnort
an encryption algorithm.
Access restrictions
an encryption algorithm.
Shoulder surfing
an encryption algorithm.
WEP2
an encryption algorithm.
Keystream attack
an encryption algorithm.
Access control
stream cipher that accepts keys up to 128 bits in length.
SSID
stream cipher that accepts keys up to 128 bits in length.
RC4
stream cipher that accepts keys up to 128 bits in length.
Cipher
stream cipher that accepts keys up to 128 bits in length.
AirSnort
stream cipher that accepts keys up to 128 bits in length.
Access restrictions
stream cipher that accepts keys up to 128 bits in length.
Shoulder surfing
stream cipher that accepts keys up to 128 bits in length.
WEP2
stream cipher that accepts keys up to 128 bits in length.
Keystream attack
stream cipher that accepts keys up to 128 bits in length.
Access control
can limit a user's access to the Internet.
SSID
can limit a user's access to the Internet.
RC4
can limit a user's access to the Internet.
Cipher
can limit a user's access to the Internet.
AirSnort
can limit a user's access to the Internet.
Access restrictions
can limit a user's access to the Internet.
Shoulder surfing
can limit a user's access to the Internet.
WEP2
can limit a user's access to the Internet.
Keystream attack
can limit a user's access to the Internet.
Access control
tool to perform WEP attacks.
SSID
tool to perform WEP attacks.
RC4
tool to perform WEP attacks.
Cipher
tool to perform WEP attacks.
AirSnort
tool to perform WEP attacks.
Access restrictions
tool to perform WEP attacks.
Shoulder surfing
tool to perform WEP attacks.
WEP2
tool to perform WEP attacks.
Keystream attack
tool to perform WEP attacks.
Access control
looking over someone's shoulder.
SSID
looking over someone's shoulder.
RC4
looking over someone's shoulder.
Cipher
looking over someone's shoulder.
AirSnort
looking over someone's shoulder.
Access restrictions
looking over someone's shoulder.
Shoulder surfing
looking over someone's shoulder.
WEP2
looking over someone's shoulder.
Keystream attack
looking over someone's shoulder.
Access control
method of determining the keystream by analyzing two packets that were created from the same IV.
SSID
method of determining the keystream by analyzing two packets that were created from the same IV.
RC4
method of determining the keystream by analyzing two packets that were created from the same IV.
Cipher
method of determining the keystream by analyzing two packets that were created from the same IV.
AirSnort
method of determining the keystream by analyzing two packets that were created from the same IV.
Access restrictions
method of determining the keystream by analyzing two packets that were created from the same IV.
Shoulder surfing
method of determining the keystream by analyzing two packets that were created from the same IV.
WEP2
method of determining the keystream by analyzing two packets that were created from the same IV.
Keystream attack
method of determining the keystream by analyzing two packets that were created from the same IV.
Access control
method of restricting access to resources.
SSID
method of restricting access to resources.
RC4
method of restricting access to resources.
Cipher
method of restricting access to resources.
AirSnort
method of restricting access to resources.
Access restrictions
method of restricting access to resources.
Shoulder surfing
method of restricting access to resources.
WEP2
method of restricting access to resources.
Keystream attack
method of restricting access to resources.
Access control
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Wireless LAN Vulnerabilities
1
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A) social engineering
B) brute force
C) dictionary
D) birthday
C
2
In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
A
3
The SSID can be easily discovered even when it is not contained in beacon frames.
True
4
At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.

A) association request frame
B) CRC
C) ICV
D) beacon frame
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Deploying dynamic WEP is a very expensive solution that involves a lot of effort.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
A stream cipher takes one character and replaces it with another character. This output is known as the ____.

A) initialization vector
B) integrity check value
C) cyclic redundancy check
D) keystream
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.

A) active
B) passive
C) interactive
D) moving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A) confidentiality
B) integrity
C) availability
D) non-repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.

A) social engineering
B) brute force
C) dictionary
D) birthday
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ requires the wireless device (and not the user) to be authenticated prior to being connected to the network.

A) SSID
B) Wireless authentication
C) Wired confidentiality
D) Wireless availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
WEP relies on a secret key shared between a wireless client device and the access point.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

A) public key cryptography
B) asymmetric encryption
C) asymmetric cryptography
D) private key cryptography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
To encrypt packets WEP can use only a 64-bit or ____-bit number.

A) 72
B) 90
C) 110
D) 128
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
Changing the original text to a secret message using cryptography is known as ____.

A) ciphertext
B) decryption
C) encryption
D) plaintext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
Access control is intended to guard the ____ of information by making it accessible only to authorized users.

A) confidentiality
B) availability
C) integrity
D) non-repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.

A) SSID broadcast
B) handoff
C) roaming
D) scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
In WEP, the ____ is a cyclic redundancy check (CRC) value calculated with a checksum based on the contents of the text.

A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
Wireless access control through MAC address filtering is the same as access restrictions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A(n) ____ carries information about the data rates that a device can support along with the Service Set Identifier (SSID) of the network it wants to join.

A) association request frame
B) CRC
C) PRNG
D) ICV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Describe the main characteristics of the shared key authentication method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
What are some of the tools used to perform WEP attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is a MAC address?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe the main characteristics of the open system authentication method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Briefly explain how WEP implementation violates the cardinal rule of cryptography: anything that creates a detectable pattern must be avoided.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) ____________________ acts as the central base station for the wireless network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
In WEP, RC4 uses a(n) ____________________ to create the keystream.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

A) Kerberos
B) Dynamic WEP
C) WEP2
D) LDAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.

A) WEP2
B) Dynamic WEP
C) SSID
D) Roaming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
WEP2 uses a different authentication system known as ____.

A) RADIUS
B) MS-CHAPS
C) LDAP
D) Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).

A) collision
B) keystream
C) ICV
D) CRC vector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the options for creating keys in WEP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What was the criteria used by the IEEE 802.11 committee to design WEP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ traffic is traffic sent to all users on the network.

A) Unicast
B) Broadcast
C) Singlecast
D) Multicast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ traffic is traffic destined for only one address.

A) Severalcast
B) Multicast
C) Unicast
D) Broadcast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
A wireless device is set to look for beacon frames from the AP. This is known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the differences between Dynamic WEP unicast and broadcast keys?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the main characteristics of Kerberos?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
adds two new security enhancements to WEP.
SSID
adds two new security enhancements to WEP.
RC4
adds two new security enhancements to WEP.
Cipher
adds two new security enhancements to WEP.
AirSnort
adds two new security enhancements to WEP.
Access restrictions
adds two new security enhancements to WEP.
Shoulder surfing
adds two new security enhancements to WEP.
WEP2
adds two new security enhancements to WEP.
Keystream attack
adds two new security enhancements to WEP.
Access control
the "network name" for the wireless network.
SSID
the "network name" for the wireless network.
RC4
the "network name" for the wireless network.
Cipher
the "network name" for the wireless network.
AirSnort
the "network name" for the wireless network.
Access restrictions
the "network name" for the wireless network.
Shoulder surfing
the "network name" for the wireless network.
WEP2
the "network name" for the wireless network.
Keystream attack
the "network name" for the wireless network.
Access control
an encryption algorithm.
SSID
an encryption algorithm.
RC4
an encryption algorithm.
Cipher
an encryption algorithm.
AirSnort
an encryption algorithm.
Access restrictions
an encryption algorithm.
Shoulder surfing
an encryption algorithm.
WEP2
an encryption algorithm.
Keystream attack
an encryption algorithm.
Access control
stream cipher that accepts keys up to 128 bits in length.
SSID
stream cipher that accepts keys up to 128 bits in length.
RC4
stream cipher that accepts keys up to 128 bits in length.
Cipher
stream cipher that accepts keys up to 128 bits in length.
AirSnort
stream cipher that accepts keys up to 128 bits in length.
Access restrictions
stream cipher that accepts keys up to 128 bits in length.
Shoulder surfing
stream cipher that accepts keys up to 128 bits in length.
WEP2
stream cipher that accepts keys up to 128 bits in length.
Keystream attack
stream cipher that accepts keys up to 128 bits in length.
Access control
can limit a user's access to the Internet.
SSID
can limit a user's access to the Internet.
RC4
can limit a user's access to the Internet.
Cipher
can limit a user's access to the Internet.
AirSnort
can limit a user's access to the Internet.
Access restrictions
can limit a user's access to the Internet.
Shoulder surfing
can limit a user's access to the Internet.
WEP2
can limit a user's access to the Internet.
Keystream attack
can limit a user's access to the Internet.
Access control
tool to perform WEP attacks.
SSID
tool to perform WEP attacks.
RC4
tool to perform WEP attacks.
Cipher
tool to perform WEP attacks.
AirSnort
tool to perform WEP attacks.
Access restrictions
tool to perform WEP attacks.
Shoulder surfing
tool to perform WEP attacks.
WEP2
tool to perform WEP attacks.
Keystream attack
tool to perform WEP attacks.
Access control
looking over someone's shoulder.
SSID
looking over someone's shoulder.
RC4
looking over someone's shoulder.
Cipher
looking over someone's shoulder.
AirSnort
looking over someone's shoulder.
Access restrictions
looking over someone's shoulder.
Shoulder surfing
looking over someone's shoulder.
WEP2
looking over someone's shoulder.
Keystream attack
looking over someone's shoulder.
Access control
method of determining the keystream by analyzing two packets that were created from the same IV.
SSID
method of determining the keystream by analyzing two packets that were created from the same IV.
RC4
method of determining the keystream by analyzing two packets that were created from the same IV.
Cipher
method of determining the keystream by analyzing two packets that were created from the same IV.
AirSnort
method of determining the keystream by analyzing two packets that were created from the same IV.
Access restrictions
method of determining the keystream by analyzing two packets that were created from the same IV.
Shoulder surfing
method of determining the keystream by analyzing two packets that were created from the same IV.
WEP2
method of determining the keystream by analyzing two packets that were created from the same IV.
Keystream attack
method of determining the keystream by analyzing two packets that were created from the same IV.
Access control
method of restricting access to resources.
SSID
method of restricting access to resources.
RC4
method of restricting access to resources.
Cipher
method of restricting access to resources.
AirSnort
method of restricting access to resources.
Access restrictions
method of restricting access to resources.
Shoulder surfing
method of restricting access to resources.
WEP2
method of restricting access to resources.
Keystream attack
method of restricting access to resources.
Access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.