Deck 2: Wireless LAN Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 2: Wireless LAN Vulnerabilities
1
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.
A) social engineering
B) brute force
C) dictionary
D) birthday
A) social engineering
B) brute force
C) dictionary
D) birthday
C
2
In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.
A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
A
3
The SSID can be easily discovered even when it is not contained in beacon frames.
True
4
At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.
A) association request frame
B) CRC
C) ICV
D) beacon frame
A) association request frame
B) CRC
C) ICV
D) beacon frame
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Deploying dynamic WEP is a very expensive solution that involves a lot of effort.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A stream cipher takes one character and replaces it with another character. This output is known as the ____.
A) initialization vector
B) integrity check value
C) cyclic redundancy check
D) keystream
A) initialization vector
B) integrity check value
C) cyclic redundancy check
D) keystream
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.
A) active
B) passive
C) interactive
D) moving
A) active
B) passive
C) interactive
D) moving
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.
A) confidentiality
B) integrity
C) availability
D) non-repudiation
A) confidentiality
B) integrity
C) availability
D) non-repudiation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.
A) social engineering
B) brute force
C) dictionary
D) birthday
A) social engineering
B) brute force
C) dictionary
D) birthday
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ requires the wireless device (and not the user) to be authenticated prior to being connected to the network.
A) SSID
B) Wireless authentication
C) Wired confidentiality
D) Wireless availability
A) SSID
B) Wireless authentication
C) Wired confidentiality
D) Wireless availability
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
WEP relies on a secret key shared between a wireless client device and the access point.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.
A) public key cryptography
B) asymmetric encryption
C) asymmetric cryptography
D) private key cryptography
A) public key cryptography
B) asymmetric encryption
C) asymmetric cryptography
D) private key cryptography
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
To encrypt packets WEP can use only a 64-bit or ____-bit number.
A) 72
B) 90
C) 110
D) 128
A) 72
B) 90
C) 110
D) 128
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Changing the original text to a secret message using cryptography is known as ____.
A) ciphertext
B) decryption
C) encryption
D) plaintext
A) ciphertext
B) decryption
C) encryption
D) plaintext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Access control is intended to guard the ____ of information by making it accessible only to authorized users.
A) confidentiality
B) availability
C) integrity
D) non-repudiation
A) confidentiality
B) availability
C) integrity
D) non-repudiation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.
A) SSID broadcast
B) handoff
C) roaming
D) scanning
A) SSID broadcast
B) handoff
C) roaming
D) scanning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In WEP, the ____ is a cyclic redundancy check (CRC) value calculated with a checksum based on the contents of the text.
A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
A) initialization vector (IV)
B) pseudo-random number generator (PRNG)
C) integrity check value (ICV)
D) RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Wireless access control through MAC address filtering is the same as access restrictions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) ____ carries information about the data rates that a device can support along with the Service Set Identifier (SSID) of the network it wants to join.
A) association request frame
B) CRC
C) PRNG
D) ICV
A) association request frame
B) CRC
C) PRNG
D) ICV
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the main characteristics of the shared key authentication method.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
What are some of the tools used to perform WEP attacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What is a MAC address?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Describe the main characteristics of the open system authentication method.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly explain how WEP implementation violates the cardinal rule of cryptography: anything that creates a detectable pattern must be avoided.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____________________ acts as the central base station for the wireless network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
In WEP, RC4 uses a(n) ____________________ to create the keystream.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
A) Kerberos
B) Dynamic WEP
C) WEP2
D) LDAP
A) Kerberos
B) Dynamic WEP
C) WEP2
D) LDAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.
A) WEP2
B) Dynamic WEP
C) SSID
D) Roaming
A) WEP2
B) Dynamic WEP
C) SSID
D) Roaming
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
WEP2 uses a different authentication system known as ____.
A) RADIUS
B) MS-CHAPS
C) LDAP
D) Kerberos
A) RADIUS
B) MS-CHAPS
C) LDAP
D) Kerberos
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).
A) collision
B) keystream
C) ICV
D) CRC vector
A) collision
B) keystream
C) ICV
D) CRC vector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the options for creating keys in WEP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What was the criteria used by the IEEE 802.11 committee to design WEP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____ traffic is traffic sent to all users on the network.
A) Unicast
B) Broadcast
C) Singlecast
D) Multicast
A) Unicast
B) Broadcast
C) Singlecast
D) Multicast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ traffic is traffic destined for only one address.
A) Severalcast
B) Multicast
C) Unicast
D) Broadcast
A) Severalcast
B) Multicast
C) Unicast
D) Broadcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A wireless device is set to look for beacon frames from the AP. This is known as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the differences between Dynamic WEP unicast and broadcast keys?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the main characteristics of Kerberos?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck