1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Q: What are wireless attacks?
A: Attacks targeting wireless communication technologies. For example:
Bluetooth
Near Field Communication (NFC)
RFID
Wireless LANs (WLANs)
Q: What is Bluetooth?
A: A short-range wireless RF technology for device pairing.
Q: What type of network does Bluetooth form?
A: Personal Area Network (PAN).
Q: What is a piconet?
A: A Bluetooth network with one master and multiple slaves.
Q: What is bluejacking?
A: Sending unsolicited messages to Bluetooth devices. Mostly annoying, as there was no data theft.
Q: What is bluesnarfing?
A: Stealing data via unauthorized Bluetooth access.
Q: What is NFC?
A: Short-range communication technology requiring close proximity (≤4 cm).
Q: What is a passive NFC device?
A: A device that stores data but does not transmit actively.
Q: What is an active NFC device?
A: A device that sends and receives data.
Q: What is NFC eavesdropping?
A: Intercepting unencrypted NFC transmissions.
Q: How can NFC data theft occur?
A: Attackers bump devices in crowds to steal data.
Q: How can NFC attacks be prevented?
A:
Turn off NFC in crowds
Use PINs/passwords
Device pairing restrictions
Q: What is RFID?
A: Technology that transmits data using radio waves and tags. Most are passive
Q: What is unauthorized tag access?
A: Reading RFID data without permission.
Q: What are fake RFID tags?
A: Tags containing false inventory data.
Q: What is RFID eavesdropping?
A: Listening to RFID communications.
Q: What is a WLAN?
A: A wireless replacement or supplement to wired LANs.
Q: Why are WLANs riskier than wired LANs?
A: They create blurred security boundaries.
Q: What organization develops WLAN standards?
A: IEEE.
Q: What is a wireless NIC?
A: Adapter that enables wireless communication.
Q: What is an access point (AP)?
A: A base station connecting wireless and wired networks.
Q: What is infrastructure mode?
A: WLAN using an access point.
Q: What is ad hoc mode?
A: Devices communicate directly without an AP.
Q: What is a rogue access point?
A: Unauthorized AP installed on a network.
Q: What is an evil twin?
A: Fake AP impersonating a legitimate one.
Q: What is wireless replay attack?
A: Capturing and reusing wireless transmissions.
Q: What is wireless DoS?
A: Disrupting WLAN availability.
Q: Why is wireless security critical?
A: Wireless signals can be intercepted beyond physical boundaries.
Q: What is the best defense against WLAN attacks?
A: Strong encryption, authentication, and monitoring.