• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
The encryption protocol standard for WPA2.
An attack that sends unsolicited messages to Bluetooth-enables devices.
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
A Wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings.
evil twin:
An AP setup by an attacker to mimic an authorized AP and capture transmissions, so a users device will unknowingly connect to this evil twin instead.
extensible authentication protocol (EAP)
A framework for transporting authentication protocols that defines the format of the messages.
initialization vector(IV):
A 24-bit value used in WEP that changes each time a packet is encrypted.
Keystream attack (IV attack):
A method of determining the key stream by analyzing two packets that were created from the same initialization vector (IV).
Lightweight EAP(LEAP):
A proprietary EAP method developed by Cisco systems requiring mutual authentication used for WLAN encryption using Cisco client software:
Media Access Control(MAC) address filtering:
A method for controlling access to a WLAN based on the devices MAC address
preshared key(PSK)
A key value that must be created and entered into both the access point and all wireless devices ("Shared") prior to ("pre") the devices communicating with the AP.
Protected EAP (PEAP):
An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords.
rogue access point:
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Service Set identifier (SSID):
The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters.
SSID broadcast:
The transmission of the SSID from the access point to wireless devices.
SSID broadcast:
The transmission of the SSID from the access point to wireless devices.
Temporal Key Integrity protocol (TKIP):
A WPA encryption technology
war chalking:
The process of documenting and then advertising the location of wireless LANs for others to use. Wireless networks were identified by drawing on sidewalks or walls around the area of the network.
war driving:
Searching for wireless signals from an automobile or on foot using a portable computing device.
Wi-Fi Protected Access(WPA):
The original set of protections from the Wi-Fi alliance in 2003 designed to protect both present and future wireless devices.
Wi-fi Protected Access 2(WPA2):
The second generation of WPA security from the Wi-Fi alliance in 2004 to address authentication and encryption on WLANS.
Wired Equivalent Privacy(WEP):
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.