Jamming - correct answer The wireless network is overwhelmed with wireless traffic,
thereby jamming the network.
Service set identifier - correct answer SSID
Beacon - correct answer Used to identify a wireless link
Open Authentication - correct answer Basically a null authentication that can enable
any client to authenticate to an AP
Shared key Authentication - correct answer Both the client and the access point share
a key called a pre-shared key (PSK).
WEP (Wired Equivalent Privacy) - correct answer wireless security protocol that
encrypts and decrypts wireless data packets;
Uses RC4 algorithm for encryption but does not use a key management;
Initialization vector is only 24 bits in size and is always static
WPA (Wi-Fi Protected Access) - correct answer improved wireless security protocol
that supports user authentication provided by 802.1x;
Uses RC4 algorithm for encryption;
Provides a key management mechanism via TKIP and file integrity monitoring
, TKIP (Temporal Key Integrity Protocol) - correct answer security protocol that
generates a sequence of WEP keys based on a master pre-shared key and rekeys
periodically every 10,000 packets
AES (Advance Encryption Standard) - correct answer encryption algorithm used by
WPA2
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol) - correct answer key management used by WPA2
LEAP - correct answer A wireless security system used by Cisco
War Drive - correct answer A process in which attackers search for locations with an
open wireless network or a weak wireless network, so that they can gain more access
to collect information or data of connecting users
War Chalking - correct answer This is the next step after war drive, which is to leave
marks or symbols to notify other hackers about the wireless vulnerabilities of the
location.
Probing - correct answer Indicators of repeated attempts to make connections to
certain machines
Signature - correct answer indicators of known attacks
Single sign-on (SSO) - correct answer Using one authentication credential
(token/ticket) to access multiple accounts or applications.
Social Engineering - correct answer A process by which an intruder obtains enough
information from people to gain access to the network
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.