📘 Chapter 6 – Wireless Network Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Q: What are wireless attacks?

A: Attacks targeting wireless communication technologies. For example:

  • Bluetooth

  • Near Field Communication (NFC)

  • RFID

  • Wireless LANs (WLANs)

2
New cards

Q: What is Bluetooth?

A: A short-range wireless RF technology for device pairing.

3
New cards

Q: What type of network does Bluetooth form?

A: Personal Area Network (PAN).

4
New cards

Q: What is a piconet?

A: A Bluetooth network with one master and multiple slaves.

5
New cards

Q: What is bluejacking?

A: Sending unsolicited messages to Bluetooth devices. Mostly annoying, as there was no data theft.

6
New cards

Q: What is bluesnarfing?

A: Stealing data via unauthorized Bluetooth access.

7
New cards

Q: What is NFC?

A: Short-range communication technology requiring close proximity (≤4 cm).

8
New cards

Q: What is a passive NFC device?

A: A device that stores data but does not transmit actively.

9
New cards

Q: What is an active NFC device?

A: A device that sends and receives data.

10
New cards

Q: What is NFC eavesdropping?

A: Intercepting unencrypted NFC transmissions.

11
New cards

Q: How can NFC data theft occur?

A: Attackers bump devices in crowds to steal data.

12
New cards

Q: How can NFC attacks be prevented?

A:

  • Turn off NFC in crowds

  • Use PINs/passwords

  • Device pairing restrictions

13
New cards

Q: What is RFID?

A: Technology that transmits data using radio waves and tags. Most are passive

14
New cards

Q: What is unauthorized tag access?

A: Reading RFID data without permission.

15
New cards

Q: What are fake RFID tags?

A: Tags containing false inventory data.

16
New cards

Q: What is RFID eavesdropping?

A: Listening to RFID communications.

17
New cards

Q: What is a WLAN?

A: A wireless replacement or supplement to wired LANs.

18
New cards

Q: Why are WLANs riskier than wired LANs?

A: They create blurred security boundaries.

19
New cards

Q: What organization develops WLAN standards?

A: IEEE.

20
New cards

Q: What is a wireless NIC?

A: Adapter that enables wireless communication.

21
New cards

Q: What is an access point (AP)?

A: A base station connecting wireless and wired networks.

22
New cards

Q: What is infrastructure mode?

A: WLAN using an access point.

23
New cards

Q: What is ad hoc mode?

A: Devices communicate directly without an AP.

24
New cards

Q: What is a rogue access point?

A: Unauthorized AP installed on a network.

25
New cards

Q: What is an evil twin?

A: Fake AP impersonating a legitimate one.

26
New cards

Q: What is wireless replay attack?

A: Capturing and reusing wireless transmissions.

27
New cards

Q: What is wireless DoS?

A: Disrupting WLAN availability.

28
New cards

Q: Why is wireless security critical?

A: Wireless signals can be intercepted beyond physical boundaries.

29
New cards

Q: What is the best defense against WLAN attacks?

A: Strong encryption, authentication, and monitoring.