Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (10)
Which of the IEEE 802.11 protocols has the highest maximum data transfer rate?
Does disabling SSID broadcasting provide effective protection against the WLAN being discovered by an attacker?
NO. The SSID can still be sniffed by an attacker, because clients must transmit the SSID in order to associate with the WLAN.
Which of these WLAN encryption protocols is the most secure?
What is a major vulnerability when using Shared Key Authentication to connect to an Access Point (AP)?
Both the clear text challenge and the encrypted response from the wireless user can be monitored by an attacker. They can then use the cleartext and the ciphertext to calculate the WEP key.
How is the Extensible Authentication Protocol (EAP) implemented?
The Access Point (AP) works with a Remote Authentication Dial-In User Service (RADIUS) server on the wired network to perform wireless user authentication.
What is a Bluetooth network called?
Which is the best description of the Bluetooth network architecture?
master / slave
What is RFID used for?
to identify items to which an RFID tag has been attached
What equipment do you need to do wi-fi hacking?
a computer with the Kali OS and a good wi-fi antenna
How does an attacker perform a denial of service (DoS) attack against users of a wi-fi network using disassociation or deauth?
the attacker sends 802.11 disassociation or deauth packets to the Access Point (AP) that contain the MAC address of the targeted user
Sets with similar terms
Chapter 9 ( Wireless Networking and Security)
CCNA 3 Chap 7
WiFi Terminology 8109
Managing and Troubleshooting Networks Chapter 15 (…
Sets found in the same folder
Other sets by this creator
Mile 2 Module Quizzes (Ch 1 - 16)
Other Quizlet sets
Chapter 3: Hieroglyphs and Art
A&P chapter 10
Biology 121 Exam 5