Study sets, textbooks, questions
Upgrade to remove ads
Chapter 9 Quiz Terms - ITSY 1342
Terms in this set (41)
An attack that sends unsolicited messages to Bluetooth-enabled devices.
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.
A wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings.
An infrastructure that is used on public access WLANs to provide a higher degree of security.
captive portal AP
A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP).
Challenge-Handshake Authentication Protocol (CHAP)
The encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES.
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead of the authorized AP.
A framework for transporting authentication protocols that defines the format of the messages.
Extensible Authentication Protocol (EAP)
A 24-bit value used in WEP that changes each time a packet is encrypted.
initialization vector (IV)
A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software.
Lightweight EAP (LEAP)
A method for controlling access to a WLAN based on the device's MAC address.
Media Access Control (MAC) address filtering
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.
near field communication (NFC)
A weak authentication protocol that has ben replaced by the Extensible Authentication Protocol (EAP).
Password Authentication Protocol (PAP)
The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
preshared key (PSK)
An EAP method desgned to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords.
Protected EAP (PEAP)
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
rogue access point
The alphanumeric user-supplied network name of a WLAN.
Service Set Identifier (SSID)
An in-depth examination and analysis of a wireless LAN site.
The WPA and WPA2 encrytion technology.
Temporal Key Integrity Protocol (TKIP)
The process of documenting and then advertising the location of wireless LANs for others to use.
Searching for wireless signals from an automobile or on foot using a portable computing device.
The original set of protections from the Wi-Fi Alliance designed to address both encryption and authentication.
Wi-Fi Protected Access (WPA)
The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.
Wi-Fi Protected Access 2 (WPA2)
An optional means of configuring security on wireless local area networks primarily intended to help users who have little or no knowledge of security to quickly and easly implement security on their WLANs. Due to design and implementation flaws, WPS is not considered secure.
Wi-Fi Protected Setup (WPS)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
Wired Equivalency Privacy (WEP)
A wireless network designed to replace or supplement a wired local area network (LAN).
wireless local area network (WLAN)
A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker's presence being detected.
Bluetooth is a _____ _____ _____ technology designed for data communication over short distances.
Personal Area Network (PAN)
A _____ _____ _____ uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security.
captive portal AP
There are two types of Bluetooth network topologies. The first is a _____. When two Bluetooth devices come within range of each other, they automatically connect with one another.
One device is the _____, and controls all of the wireless traffic. The other device is known as a _____, which takes commands from the master.
Slave devices that are connected to the piconet and are sending transmissions are known as _____ _____; devices that are connected but are not actively participating are called _____ _____.
active slaves, parked slaves
If multiple piconets cover the same area, a Bluetooth device can be a member in two or more overlaying piconets. A group of piconets in which connections exists between different piconets is called a _____.
The current version is Bluetooth v_____, yet all Bluetooth devices are backward compatible with previous versions. Most Bluetooth devices have a range of _____ feet and can transmit _____ million bits per second (Mbps).
4.0, 33, 1
TKIP's enhancements are in three basic areas: the required key length is increased from 64 bits to _____ bits, the IV is increased from 24 bits to _____ bits, and a unique "base key" is created for each wireless device using a master key derived in the authentication process along with the sender's unique MAC address.
The SSID serves as the user-supplied network name of a wireless network and generally can be any alphanumeric string up to _____ characters.
A 128-bit key performs _____ rounds, a 192-bit key performs _____ rounds, a 256-bit key performs _____ rounds
9, 11, 13
_____ _____ is for individuals or small office/home offices and _____ _____ is for larger enterprises, schools, and government agencies.
WPA2 Personal, WPA2 Enterprise
_____ packets are issued by the authenticator and ask for a _____ packet from the supplicant.
If the authentication is successful, a _____ packet is sent to the supplicant; if not, a _____ packet is sent.
Sets found in the same folder
Chapter 8 Quiz Terms - ITSY 1342
Chapter 5 - Basic Cryptography - Quiz Terms
Chapter 6 - Advanced Cryptography - Quiz Terms
ITSY 1342 - Midterm
Sets with similar terms
Chapter 9 - Wireless Network Security (Key Terms)
Chapter 9: Wireless Network Security
Corporate Cyber - Chapter 9
Intro to Network Security sixth ed chapter 8
Other sets by this creator
CEH - Quiz 1 & 2
SEC401.1 - Networking Concepts
Other Quizlet sets
D Comm Final