• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back

antenna

a rod, wire, or other device used to transmit or receive radio or television signals

bluejacking

an attack that sends unsolicited messages to Bluetooth-enabled devices

bluesnarfing

an attack that accesses unauthorized information from a wireless device through a Bluetooth connection

Bluetooth

an wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings

captive portal AP

an infrastructure that is used on public access WLANs to provide a higher degree of security

Challenge-Handshake Authentication Protocol (CHAP)

a weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP)

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

the encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES

evil twin

an AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead of the authorized AP

Extensive Authentication Protocol (EAP)

a framework for transporting authentication protocols that defines the format of the messages

factitious

artificially created or developed

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication

initialization vector (IV)

a 24-bit value used in WEP that changes each time a packet is encrypted

interface

a point where two systems, subjects, organizations, etc., meet and interact

Lightweight EAP (LEAP)

a proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software

Linux

an open-source operating system modeled on UNIX

Media Access Control (MAC) address filtering

a method for controlling access to a WLAN based on the device's MAC address

near field communication (NFC)

a set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity

Password Authentication Protocol (PAP)

a weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP)

Piconet

a network of devices connected using Bluetooth technology

preshared key (PSK)

the authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating

Protected EAP (PEAP)

an EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords

protocol

the special set of rules that end points in a telecommunication connection use when they communicate


specify interactions between the communicating entities

RF jamming

intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring

rogue access point

an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks

Scatternet

a type of ad hoc computer network consisting of two or more piconets
the terms "scatternet" and "piconet" are typically applied to Bluetooth wireless technology

Service Set Identifier (SSID)

the alphanumeric user-supplied network name of a WLAN

site survey

an in-depth examination and analysis of a wireless LAN site

telecommunications

communication over a distance by cable, telegraph, telephone, or broadcasting

Temporal Key Integrity Protocol (TKIP)

the WPA and WPA2 encryption technology

topology

the way in which constituent parts are interrelated or arranged.

transmitter

a set of equipment used to generate and transmit electromagnetic waves carrying messages or signals, especially those of radio or television

unencrypted

(of information or data) not converted into a code that would prevent unauthorized access

unsolicited

not asked for; given or done voluntarily

war chalking

the process of documenting and then advertising the location of wireless LANs for others to use

war driving

searching for wireless signals from an automobile or on foot using a portable computing device

Wi-Fi Protected Access (WPA)

the original set of protections from the Wi-Fi Alliance designed to address both encryption and authentication

Wi-Fi Protected Access 2 (WPA2)

the second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security

Wi-Fi Protected Setup (WPS)

an optional means of configuring security on wireless local area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs


Due to design and implementation flaws, WPS is not considered secure

Wired Equivalent Privacy (WEP)

an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information


WEP has significant vulnerabilities and is not considered secure

wireless local area network (WLAN)

a wireless entwork designed to replace or supplement a wired local area network (LAN)

wireless replay

a passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker's presence being detected