• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

A potential open and unsecured gateway straight into the wired infrastructure.

Rogue Access Point

True or False




When a client station is confgured in Ad Hoc mode, the wireless network is known as an independent basic service set (IBSS), and all communications do not occur in a peer-to-peer connection?

False




All connections are peer-to-peer in an IBSS (Independent Basic Service Set)

Packets that arrive at an AP's wireless interface are not forwarded back out of the wireless interface to other clients. What term is used to describe this?

Client isolation or peer-to-peer blocking

Access to wireless transmission operate in license free frequency bands. This means that communications can be monitored via what two eavesdropping methods?

Casual eavesdropping and malicious eavesdropping

The act of driving around looking for wireless networks.

Wardriving (outdated, was popular in the infancy of wireless networking)

This protocol is susceptible to offline dictionary attacks. A hacker captures a frame exchange when a user authenticates and then may run the file through an offline dictionary attack tool.

Lightweight Extensible Authentication Protocol (LEAP)

Editing the Wi-Fi's radio's MAC address to impersonate that radio is known as what?

MAC Spoofing

Configuring access point software on a laptop, turning the laptop into an access point with the same SSID as a nearby hotspot. Using this laptop to send spoofed disassociation or deauthentication frames, forcing users associated with the hotspot to roam to your laptop's AP. This is known as what?

Wireless Hijacking or Evil Twin.

RF jamming attacks occur at what layer of the OSI model?

Layer 1 physical layer

What are the two most common type of RF jamming attacks?

Intentional and Unintentional Jamming

The 802.11w-2009 amendment defines what that prevents spoofing of certain types of 802.11 management frames.

MFP (management frame protection)

A technique used to divulge confidential information from people.

Social engineering

A wireless intrusion detection system (WIDS) consists of what three components?

WIDS Server


Management Consoles


Sensors

This acts as a central point of monitoring security and performance data collection. This uses signature/behavior/protocol/RF spectrum-analysis to detect potential threats.

WIDS Server

A software base console used to communicate to a WIDS server from a desktop station. The software interface used for administration and configuration.

Management Console

Hardware or software that are used to listen to and capture all 802.11 communications.

Sensor

What are the three WIDS (Wireless Intrusion Detection System) design models?

Overlay


Integrated


Integration Enabled

This is the most secure model in a WIDS. Consists of a WIDS server and sensors that are not part of the WLAN solution. This model uses an independent vendor's WIDS.

Overlay

A centralized WLAN controller or NMS (Network Management System) functions as the Intrusion Detection System. Access points can be configured in a sensor mode. What is this WIDS model?

Integrated

This WIDS model the Wi-Fi vendors install software code in the AP that turns them into sensors that communicate with a third party WIDS server.

Integration enabled

A wireless security policy includes what?

General Security Policy


Functional Security Policy


Legislative Compliance

Man in the middle attacks, hijacking, or Wi-Fi phishing attacks can be prevented by what?

Mutual authentication

A WIDS/WIPS can not detect what kind of device threats?

A FHSS 2.4 GHz device




A 900 MHz wireless device