Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
A potential open and unsecured gateway straight into the wired infrastructure. |
Rogue Access Point |
|
True or False When a client station is confgured in Ad Hoc mode, the wireless network is known as an independent basic service set (IBSS), and all communications do not occur in a peer-to-peer connection? |
False All connections are peer-to-peer in an IBSS (Independent Basic Service Set) |
|
Packets that arrive at an AP's wireless interface are not forwarded back out of the wireless interface to other clients. What term is used to describe this? |
Client isolation or peer-to-peer blocking |
|
Access to wireless transmission operate in license free frequency bands. This means that communications can be monitored via what two eavesdropping methods? |
Casual eavesdropping and malicious eavesdropping |
|
The act of driving around looking for wireless networks. |
Wardriving (outdated, was popular in the infancy of wireless networking) |
|
This protocol is susceptible to offline dictionary attacks. A hacker captures a frame exchange when a user authenticates and then may run the file through an offline dictionary attack tool. |
Lightweight Extensible Authentication Protocol (LEAP) |
|
Editing the Wi-Fi's radio's MAC address to impersonate that radio is known as what? |
MAC Spoofing |
|
Configuring access point software on a laptop, turning the laptop into an access point with the same SSID as a nearby hotspot. Using this laptop to send spoofed disassociation or deauthentication frames, forcing users associated with the hotspot to roam to your laptop's AP. This is known as what? |
Wireless Hijacking or Evil Twin. |
|
RF jamming attacks occur at what layer of the OSI model? |
Layer 1 physical layer |
|
What are the two most common type of RF jamming attacks? |
Intentional and Unintentional Jamming |
|
The 802.11w-2009 amendment defines what that prevents spoofing of certain types of 802.11 management frames. |
MFP (management frame protection) |
|
A technique used to divulge confidential information from people. |
Social engineering |
|
A wireless intrusion detection system (WIDS) consists of what three components? |
WIDS Server Management Consoles Sensors |
|
This acts as a central point of monitoring security and performance data collection. This uses signature/behavior/protocol/RF spectrum-analysis to detect potential threats. |
WIDS Server |
|
A software base console used to communicate to a WIDS server from a desktop station. The software interface used for administration and configuration. |
Management Console |
|
Hardware or software that are used to listen to and capture all 802.11 communications. |
Sensor |
|
What are the three WIDS (Wireless Intrusion Detection System) design models? |
Overlay Integrated Integration Enabled |
|
This is the most secure model in a WIDS. Consists of a WIDS server and sensors that are not part of the WLAN solution. This model uses an independent vendor's WIDS. |
Overlay |
|
A centralized WLAN controller or NMS (Network Management System) functions as the Intrusion Detection System. Access points can be configured in a sensor mode. What is this WIDS model? |
Integrated |
|
This WIDS model the Wi-Fi vendors install software code in the AP that turns them into sensors that communicate with a third party WIDS server. |
Integration enabled |
|
A wireless security policy includes what? |
General Security Policy Functional Security Policy Legislative Compliance |
|
Man in the middle attacks, hijacking, or Wi-Fi phishing attacks can be prevented by what? |
Mutual authentication |
|
A WIDS/WIPS can not detect what kind of device threats? |
A FHSS 2.4 GHz device A 900 MHz wireless device |