12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The IEEE 802.11___ standard is also known as Wi-Fi 5.

802.11ac

The limitations of using higher frequencies is counteracted through implementing ___________ cell sizes.

smaller

The preferred method to break WEP encryption is through using a _______ ______ attack.

statistical analysis attack.

What is the frequency of operation for NFC devices?

13.56 MHz

Worldwide, there are _______ channels allocated for use in the 2.4 GHz ISM band.

14

What is the max data rate for Z-Wave transmissions?

100 Kbps

What is the max transmit power and typical range for Power Class 1 interfaces?

100 mW and 100 meters

Bluetooth 4.0 Low Energy supports typical ranges up to _______ (n) meters while Bluetooth 5.0 Low Energy increased the max typical range to _______ (n) meters.

10; 40

What is the maximum number of attempts required to guess the WPS PIN value using the reaver tool

11,000

Which type of frame is protected by 802.11w amendment?

Management Frames

What 3 components are required to create a Classic Bluetooth Security (Link) Key? Which part(s) is/are sent during the pairing process?

BD_ADDR, PIN value, and some Random Numbers Only the Random numbers are sent during the pairing process. - The PIN is never transmitted - The BD_ADDR is only transmitted when in Discoverable mode

What network architecture utilizes a single AP in master mode?

Basic Service Set (BSS)

WPA2 employs the _____________encryption scheme.

CCMP

Encryption attempts to secure this aspect of wireless communications.

Confidentiality

May be compromised by the unbounded nature of wireless communications.

Confidentiality

Three components of the camera.

sensor, lens, and image processor

What is another term used for SSID?

ESSID

Which mode of deployment requires the use of 802.1X/EAP for authentication and key delivery

Enterprise

In a 4G LTE cellular network, the _____________ component within the Radio Access Network controls the RAN by coordinating hand-offs, frequency spectrum management, and forwarding traffic between the RAN and the control network.

Evolved NodeB (eNB)

What is the biggest security concern with RFID?

"Skimming" and duplication of RFID tags

For Bluetooth Low Energy 4.0 Max Data Rate: ____ Typical Max Range: ____ Max Payload Size: ___

1 Mbps 10 meters 39 bytes

Bluetooth 4.0 Low Energy frames have a max payload size of ________ (n) bytes while Bluetooth 5.0 Low Energy increased the max payload size to ________ (n) bytes.

1 byte; 2 bytes

What is the max transmit power and typical range for Power Class 3 interfaces?

1 mW and 1 meter

Within the U.S. full-power transmission is limited to channels ___ to _____ in the 2.4 GHz ISM band. Channels ____ and ____ can be used in low-power operations.

1 to 11 in US. 12 and 13 low-power

In what five frame subtypes can an SSID value be found?

1. Beacon 2. Probe Request 3. Probe Response 4. Association Request 5. Re-Association Request

3 methods of Denial of Service Attacks

1. CTS Attack 2. De-Authentication Attack 3. Jamming

What are the 3 NFC modes of operation?

1. Card Emulation 2. Discovery (read & write) 3. Peer-to-peer communications

2 styles of Man-in-the-Middle Attacks

1. Evil Twin (Rogue AP) 2. ARP Cache poisoning

What are the components of an NFC system?

1. Initiator 2. Target

What are the 3 methods of Captive Portal Bypass

1. MAC Address Spoofing 2. IP Address Spoofing 3. Covert Tunneling

What are the three major components of an RFID system?

1. Reader/Interrogator 2. Antenna 3. Tag

5 reasons of a De-Authentication attack

1. Reveal hidden SSID 2. Stimulate EAPOL 4-way handshake 3. Denial of Service 4. Flush ARP cache 5. Entice victim to join Evil T

What are the two types of Active Tags?

1. Transponder - transmits when interrogated 2. Beacon - transmits on a periodic basis

What makes intercepting Bluetooth traffic difficult?

1. Use of FHSS modulation -Unique and long hopping pattern -Pattern may have been altered due to AFH 2. Standard Bluetooth interfaces do not support "monitor-mode" passive sniffing

What is the max transmit power and typical range for Power Class 1.5 interfaces?

10 mW and 20 meters

lassic Bluetooth devices support connections up to ______ (n) meters for normal use cases. Classic Bluetooth can support connections up to a maximum of ______ (n) meters.

10 meters; 100 meters

What is the typical max range of transmission for ZigBee devices?

10 to 20 meters

What is the hopping rate for Classic Bluetooth operations?

1600 hops per second

Bluetooth 4.0 Low Energy supports data rates up to ______ (n) Mbps while Bluetooth 5.0 Low Energy increased the max data rate to ______ (n) Mbps.

1; 2

For Bluetooth Low Energy 5.0 Max Data Rate: ____ Typical Max Range: ____ Max Payload Size: ___

2 Mbps 40 meters 257 bytes

Mobile cellular devices typically have ________ or ________ antennas dedicated for cellular communications. These antennas come in two categories: Answer andAnswer

2 or 4

In what frequency band does BLE operate?

2.4 GHz ISM Band

In what frequency range does Classic Bluetooth operate?

2.4 GHz ISM Band

What is the most common frequency range for ZigBee networks?

2.4 GHz ISM band

Classic Bluetooth operates in the _____ (n) GHz frequency band.

2.4 ghz

Bluetooth Low Energy (BLE) operates in the ________ (n) GHz frequency band using FHSS over 40 total channels; _______ (n) data channels and ________(n) advertising channels.

2.4 ghz; 37 data; 3 advertising

What is the max transmit power and typical range for Power Class 2 interfaces?

2.5 mW and 10 meters

EDGE is considered a ______ cellular technology from the _______ standards body.

2.5G; 3GPP

GPRS is considered a _______ cellular technology from the _______ standards body.

2.5G; 3GPP

What is the maximum payload for an unencrypted legacy IEEE 802.11 frame?

2304 bytes

What is the maximum number of devices on Z-Wave networks?

232

Initialization Vectors (IVs) used to randomize WEP encryption keys are _______-bits in length.

24

WEP IVs are __________________ bits long.

24

NB-IoT systems support data rates up to _____ Kbps.

250

What is the max data rate for ZigBee communications?

250 Kbps

GSM is considered a _____ cellular technology from the ______ standards body.

2G; 3GPP

Classic Bluetooth devices support data rates up to _______ (n) Mbps.

3

How many MAC addresses are in a typical Wi-Fi frame? What are they?

3 MAC addresses typically Source, Destination, & BSSID

What is the maximum data rate for Bluetooth Classic?

3 Mbps

In how many frequency ranges can RFID operate?

3 different frequency ranges (LF, HF, and UHF)

Each spatial stream in a 3x3:2 MIMO system has a max data rate of 150 Mbps. What is the maximum data rate for the system?

300 Mbps

In the 5 GHz UNII band, the 1st channel is channel number ______ .

36

HSPA is considered a _______ cellular technology from the _______ standards body.

3G; 3GPP

UMTS is considered a _______ cellular technology from the ______ standards body.

3G; 3GPP

What standards body created CDMA during the 2G cellular technology?

3GPP2

On how many channels/frequencies does BLE networks hop?

40 total: 37 data channels and 3 advertising channels.

Using the latest attack methods and tools, with as few as _________________ frames there is a 50% chance to successful recover a 104-bit WEP key.

40,000

What is the max data rate of transmission for NFC?

424 Kbps

Which cellular technology eliminated all circuit-switched networks and passes all traffic, including voice, across packet-switched IP network connections?

4G LTE

LTE-Advanced is considered a _______ cellular technology from the ______ standards body.

4G; 3GPP

LTE is considered a ______ cellular technology from the ______ standards body.

4g; 3GPP

In the 2.4 GHz band, there must be _______ channels of separation in order to prevent overlap.

5

What is the maximum number of devices in a ZigBee network?

65,535

Classic Bluetooth uses FHSS modulation to hop across how many frequencies?

79

For WPA/WPA2-Personal, the pre-shared key (or passphrase) can be what length of characters?

8-63 case-sensitive alphanumeric or exactly 64 hexadecimal

The IEEE 802.11___ standard is also known as Wi-Fi 6.

802.11ax

The IEEE 802.11___ standard is also known as Wi-Fi 4.

802.11n

The 802.11___ amendment provides an open standard for mesh network based on Wi-Fi standards.

802.11s

GSM devices must support encryption mode, which is all encryption turned off.

A5/0

The ________ encryption used on GSM/UMTS cellular networks only provides protection for voice calls. Broken in 2009, an attacker using open-source software and rainbow tables can decrypt traffic in near-real time.

A5/1

The _______ encryption scheme used on GSM/UMTS cellular networks protects voice and data connections.

A5/3

What is the stream cipher used by CCMP?

AES

The recovery of a WEP encryption key allows an attacker to decrypt _______ traffic ever encrypted with that key.

ALL (past, present and future)

Which style of a Man-in-the-Middle attack can insert a wireless attacker between two wired devices on the target network?

ARP Cache Poisoning

Attack used to stimulate large amounts of WEP-encrypted data for key recovery

ARP Request Replay

What is the term used to describe taking advantages of vulnerabilities of Bluetooth Profiles after establishing a connection to a target device?

Abusing Profiles

During ________________ scanning, a station transmits Probe Request frames and listens for Probe Response frames from nearby Wi-Fi networks.

Active

What are the different types of RFID tags?

Active - has own power source Passive - powered through inductive coupling of the magnetic field from the reader

What radio card mode is used for client-to-client communications without the use of an AP

Ad hoc mode

What allows Classic Bluetooth devices to alter their hopping sequences to avoid channels with interference?

Adaptive Frequency Hopping (AFH)

If an attacker possesses knowledge of the passphrase, what else do they need to be able to decrypt WPA/WPA2-Personal protected data?

Anonce & Snonce values found in the EAPOL 4-way handshake

A station can not transmit or receive data frames until the _______________________ phase has been successfully completed.

Association

What is the term used to describe using malicious code embedded in QR codes to execute malware on a victim device?

Attack Tagging or "attaggin"

Hardest aspect of wireless communications to secure or harden.

Availability

What unique value can indicate to which network a data frame belongs?

BSSID

In a 2G GSM cellular network, the _____________ component within the Radio Access Network controls the RAN by coordinating hand-offs, frequency spectrum management, and forwarding traffic between the RAN and the control network.

Base Station Controller (BSC)

In a 2G GSM cellular network, the _____________ component within the Radio Access Network houses the antennas.

Base Transciever Station (BTS)

Infrastructure Service Sets consists of what two sub-categories of network architecture?

Basic Service Set (BSS) & Extended Service Set (ESS)

5G cellular networks plan to implement __________ to focus the transmitted signal towards the user equipment (UE).

Beam Forming

Before transmitting, every Wi-Fi station conducts a ___________ to attempt to avoid collisions.

Before transmitting, every Wi-Fi station conducts a Clear Channel Assessment (CCA) to attempt to avoid collisions.

What defines security mechanisms and various applications for various Bluetooth uses?

Bluetooth Profiles

What marketing term describes devices capable of operating in BLE only?

Bluetooth Smart

What marketing term describes devices capable of operating in both Classic Bluetooth and BLE?

Bluetooth Smart Ready

Which methods Denial of Service can impact other networks near the intended target

CTS Attack and Jamming

2 or 4 of these antenna are present on mobile devices

Cellular Antennas

What are the two security models? Which is more secure?

Centralized and Distributed Centralized is more secure

Uses wider channels to transmit data faster. Can use 2, 4, or 8 channels at a time.

Channel Bonding

What kind of frame is a Clear-to-Send frame?

Control

What kind of frame is an Acknowledgement frame?

Control

What type of frame is always in plaintext (unencrypted)?

Control

Which portion of the Classic Bluetooth protocol stack is hardware-based, not user-accessible, and where encryption is implemented?

Controller Layer

What attack returns a spoofed IP address to redirect a victim to that IP address.

DNS Spoofing

What is the term used to describe changing a Bluetooth interface's name, service class, and/or BD_ADDR in order to bypass connection restrictions?

Device Identity Manipulation

What are examples of an Omnidirectional Antenna

Dipole or Whip

The three steps, in proper order, that every station must go through to connect to an 802.11 service set are _______, _________ and __________.

Discovery, Authentication, and Association.

Functions as primary input device on many mobile devices.

Display

Cellular antenna on mobile devices capable of receive-only functionality

Diversity Cellular Antenna

What is the name of the group of attacks against WPA3

Dragonblood

During what process does the PMK value get calculated in a WPA3-Personal protected network?

During the Dragonfly Key Exchange that happens in the Authentication phase of joining the network using Simultaneous Authentication of Equals (SAE) authentication.

802.11 networks must support _____________ in order to operate on channels in the 5 GHz UNII-2 and UNII-2-Extended bands to avoid interference with any local radar.

Dynamic Frequency Selection

In a 4G LTE cellular network, the Radio Access Network portion of the network is called ______________.

E-UTRAN

In a 4G LTE cellular network, the _____________ component within the Radio Access Network houses the antennas.

Evolved NodeB (eNB)

What network architecture utilizes two or more APs in master mode connected by a common Distribution System?

Extended Service Set (ESS)

The BD_ADDR is transmitted in the header of Bluetooth frames. TRUE or FALSE

FALSE, the BD_ADDR is NOT transmitted in the header of Bluetooth frames.

In the United States, the ___________________ is the regulatory domain controlling RF spectrum usage.

FCC

Classic Bluetooth uses ________ (n) modulation.

FHSS

____________________are small devices provided by mobile network operators for providing a cellular station in poor indoor coverage areas. These devices implement a complete protocol stack and may be able to be modified by attackers to perform effective rogue base station attacks

Femtocells

This technique allows a transmitter to send multiple Layer 2 frames in a single transmission. Requires the use of Block Acknowledgements.

Frame Aggregation

One of the enhancements that may be implemented in 5G cellular networks is to reduce the number of channels required for the air interface. This is accomplished through the use of a single ________ duplex channel on the air interface vice the two channels required by older generations of cellular technologies.

Full

__________is the encryption scheme used with WPA3.

GCMP

In a 2G GSM cellular network, the Radio Access Network portion of the network is called ______________.

GERAN

Other than the Diversity Cellular Antenna, which common antenna type on a mobile device is receive-only?

GPS

Receive-only antenna used to determine physical location

GPS Antenna

In 4G cellular networks, the IMSI value is replaced with a temporary identifier called the ______.

GUTI

What are the two ZigBee security modes? Which is more secure?

High Security and Standard High Security is more secure

Highly focused beam for long-range communication up to 30-miles

Highly-directional

On a Classic Bluetooth protocol stack, what is the interface called between the user-accessible protocols implemented on the Bluetooth host and the typically inaccessible protocols implemented on the Bluetooth controller?

Host Controller Interface (HCI)

Which portion of the Classic Bluetooth protocol stack is software-based, user-accessible, and is where profiles can be found?

Host Layer

What Bluetooth discovery method attempts to guess the BD_ADDR as being "off-by-one" from the Wi-Fi MAC address of the same device?

Hybrid Discovery

The ___________ is an international organization that creates and maintains a variety of standards (communications, electrical, etc.) to include the Wi-Fi protocol standard.

IEEE

What open standard is used by ZigBee devices at Layers 1 & 2?

IEEE 802.15.4

The _______ is a unique 15-digit identifier found in cellular networks that could be used to identify and track mobile subscribers.

IMSI

The ________________ is the United Nation's agency responsible for coordinating global use of the RF spectrum, satellite orbits, and international communications standards.

ITU

What open standard do Z-Wave devices use at Layers 1 & 2?

ITU-T Recommendation G.9959

If ________________ is used, WEP encryption must be implemented. If WEP encryption is implemented, both the above authentication type or __________ can be used.

If Shared Key Authentication (SKA) is used, WEP encryption must be implemented. If WEP encryption is implemented, both the above authentication type or Open System can be used.

If WPA2 encryption is implemented, __________ authentication must be used.

If WPA2 encryption is implemented, Open System authentication must be used.

What network architecture utilizes no APs but instead has client-to-client communications?

Independent Basic Service Set (IBSS)

What term is used to describe a Wi-Fi network that has 1 or more AP with the radio card in master mode?

Infrastructure Service Set

May be compromised by Man-in-the-Middle attacks.

Integrity

What type of Rogue AP attacks reply to every Probe Requests heard as the SSID being probed for

KARMA or MANA

This attack attempts to decrypt previously captured WPA/WPA2 traffic by re-installing previously used key streams.

KRACK (Key Reinstallation Attack)

The cellular IoT technology of _________________ is more suited for applications that required lower latency and mobility.

LTE-M

The air interface between the user equipment (UE) and radio access network (RAN) in a 4G LTE network is called the _____ channel.

LTE-Uu

What is the biggest security threat to Z-Wave operations?

Lack of use of the optional encryption

What is the key value used to generate the pseudorandom hopping sequence?

MAC Address of the Master device

Captive portals typically determine whether or not a client is authorized by comparing the client's reported _____ address and/or ____ address against a permit list of allowed stations.

MAC; IP

The use of Massive ____________ in 5G cellular networks allows for more antennas at each site which in turn support a greater number devices being able to connect per cell.

MIMO

Employs multiple antennas and radio chains simultaneously to send data to a single destination.

MIMO (Multiple Input/Multiple Output)

This technique allows an AP to transmit to multiple clients (up to 4) simultaneously.

MU-MIMO

What radio card mode is used for a normal Infrastructure client?

Managed mode

What kind of frame is a De-authentication frame?

Management

What kind of frame is a Probe Request?

Management

What type of frame is used to discover, authenticate, join and leave Wi-Fi networks?

Management

What are the 3 types of Wi-Fi Frames?

Management, Control, & Data

What radio card mode is used for a normal Infrastructure AP?

Master mode

What architecture does a Bluetooth piconet use?

Master-Slave structure formed in an ad hoc fashion

What technique allows devices to use extra antenna/radio chains to receive extra RF energy to improve signal quality?

Maximal Ratio Combining (MRC)

How many devices can participate in a piconet?

Maximum of 8 total devices. 1 Master device and up to 7 Slave devices.

What network topologies are supported by Z-Wave networks?

Mesh

A WLAN that conforms to the IEEE 802.11s standard is known as a ________ service set.

Mesh Basic

A ______________ acts as gateway between a Wi-Fi mesh network to another network.

Mesh Portal Point

What radio card mode is used to allow a station to act as a routing node in a mesh network?

Mesh mode

One of the network enhancement techniques is the use of __________ wave frequencies. The use of this frequency range allows for greater data rates and for more devices to be connected the cellular network.

Millimeter

The use of UMA technology introduce security concerns of _______ attacks and ______ catchers via the Wi-Fi connection.

MitM attacks and IMSI catchers

What radio card mode is used to "sniff" traffic without joining a network?

Monitor mode

2G GSM networks, and some 3G networks through backwards compatibility, are vulnerable to MitM attacks via rogue base stations due to lack of __________.

Mutual Authentication

The cellular IoT technology of _________________ supports use cases that are more latency tolerant and have fixed location.

NB-IoT

Antenna constructed of a loop of wire

NFC/RFID Antenna

In a 3G UMTS cellular network, the _____________ component within the Radio Access Network houses the antennas. component within the Radio Access Network houses the antennas.

NodeB

If an attacker has the passphrase and a EAPOL handshake from User A on a WPA3-Personal network, what can that attacker decrypt?

Nothing

This technique allows an AP to transmit to multiple clients (up to 9) simultaneously.

OFDMA

Provide 360 degree coverage around the axis of the antenna

Omnidirectional

What is the maximum number of attempts required to guess the WPS PIN value using the pixie dust tool

One

What is the minimum number of MAC addresses in a Wi-Fi frame?

One

Devices may be compromised through publicly-known vulnerabilities in ....

Out of Date Software

This attack attempts to perform a dictionary attack against WPA/WPA2-PSK passphrase without capturing a full EAPOL 4-way handshake

PMKID attack

During ________________ scanning, a stations listens for beacon frames advertising Wi-Fi networks.

Passive

Which mode of deployment uses a pre-shared key that needs to be configured on each device that joins the network?

Personal

What are the two modes of deployment that can be used by WPA, WPA2 and WPA3 protected networks?

Personal and Enterprise

Poor passcode hygiene could end with a compromise of ...

Physical Security

What is the max power and approximate range for a class 3 bluetooth interface?

Power 1 mW, approx range is 1 meter

What is the max power and approximate range for Class 1.5 bluetooth interface

Power 10 mW, approx range is 20 meters

What is the max power and approximate range for Class 1 bluetooth interface?

Power 100 mW, Approx range is 100 meters

What is the max power and approximate range for a class 2 bluetooth interface

Power 2.5 mW, approx range is 10 meters

Most OSs offer some type _____________ to store Wi-Fi network settings to simplify the process of joining a WLAN.

Preferred Network List (PNL

What are the keys used by WPA/WPA2-Personal networks

Preshared Key (PSK) Pairwise Master Key (PMK) Pairwise Transient Key (PTK) Group Transient Key (GTK)

Cellular antenna on mobile devices capable of two-way communications

Primary Cellular Antenna

Mobile cellular devices typically have 2 or 4 antennas dedicated for cellular communications. These antennas come in two categories: What are the two categories?

Primary and Diversity

______________is the stream cipher used by WEP and TKIP.

RC4

In a 3G UMTS cellular network, the _____________ component within the Radio Access Network controls the RAN by coordinating hand-offs, frequency spectrum management, and forwarding traffic between the RAN and the control network.

RNC

Provides access to the radio frequency (RF) physical layer.

Radio Adapter

What type of memory does a Mobile device use for processing?

Ram

What optional privacy feature is available for BLE devices?

Randomly generated BD_ADDR for each connection

This tool conducts an online brute force attack to recover the WPS PIN value

Reaver

What attack attempts to invalidate legitimate Security Keys to create an opportunity for an attacker to capture a new "initial" pairing?

Repairing attack

What radio card mode is used to extend the range of another AP by relaying traffic?

Repeater mode

_____________________ is an optional protocol that can be used to minimize excessive collisions in networks where "hidden nodes" exist and are causing Clear Channel Assessments to function improperly.

Request-to-send (RTS) / Clear to send (CTS)

Downside of using Higher Orders of Modulation to increase data rates

Requires higher Signal-to-Noise Ratios. More susceptible to interference.

_________ is a suite of protocols used by telecommunication providers to set-up, route, tear-down, and bill calls on the PSTN.

SS7

What term is used to describe a Wi-Fi network name?

SSID or ESSID

Provides coverage in a beam pattern less than 120 degrees.

Semi-directional

What Bluetooth protocol can be used to enumerate what services are available on a potential target device?

Service Discovery Protocol (SDP)

What are the communication modes supported by NFC?

Simplex (one-way) Half-Duples (two-way) Full-Duplex (two-way)

If WPA3 encryption is implemented, _____________authentication must be used.

Simultaneous Authentication of Equals (SAE)

What is the maximum number of MAC addresses in a Wi-Fi frame?

Six

Email phishing is a form of ....

Social Engineering

Stations can _______ to multiple APs to speed up roaming, but they can ________ to only one AP at a time.

Stations can Authenticate to multiple APs to speed up roaming, but they can Associate to only one AP at a time.

Comes in the form of RAM memory and Flash memory.

Storage

What frequency range does Z-Wave networks operate?

Sub-1 GHz (865 - 926 MHz)

The Bluetooth discovery method of Traffic Analysis attempts to read the 24-bit Lower Address Part (LAP) out of the _____ _____ and reverse engineer the 8-bit Upper Address Part (UAP) from the ________.

Sync Word and Checksum.

Houses CPU, GPU, display and video processors, cellular modems, and other hardware functionality.

System-on-a-Chip (SoC)

WPA employs the __________________encryption scheme.

TKIP

Which two encryption schemes were introduced by the IEEE 802.11i admendment

TKIP and CCMP

In 2G & 3G networks, the IMSI value is replaced with a temporary identifier called the ______

TMSI

The 802.11 Prime standard has a Max Data Rate of ______ Mbps and operates in ______ frequency band(s).

The 802.11 Prime standard has a Max Data Rate of 2 Mbps and operates in 2.4 GHz frequency band(s).

The 802.11a standard has a Max Data Rate of ____ Mbps and operates in _____ frequency band(s).

The 802.11a standard has a Max Data Rate of 54 Mbps and operates in 5 GHz frequency band(s).

The 802.11ac standard has a Max Data Rate of ____ Mbps (per stream) with a max of ___ spatial streams and operates in ______ frequency band(s).

The 802.11ac standard has a Max Data Rate of 867 Mbps (per stream) with a max of 8 spatial streams and operates in 5 GHz frequency band(s).

The 802.11ad standard has a max data rate of ______ Gbps and operates in the ______frequency range.

The 802.11ad standard has a max data rate of 6.7 Gbps and operates in the 60 GHz frequency range.

The 802.11ax standard has a Max Data Rate of _____ Mbps (per stream) with a max of ___ spatial streams and operates in _____ frequency band(s).

The 802.11ax standard has a Max Data Rate of 1200 Mbps (per stream) with a max of 8 spatial streams and operates in the 2.4 and 5 GHz frequency band(s).

The 802.11b standard has a Max Data Rate of ____ Mbps and operates in ____ frequency band(s).

The 802.11b standard has a Max Data Rate of 11 Mbps and operates in 2.4 GHz frequency band(s).

The 802.11g standard has a Max Data Rate of ____ Mbps and operates in ______ frequency band(s).

The 802.11g standard has a Max Data Rate of 54 Mbps and operates in 2.4 GHz frequency band(s).

The 802.11n standard has a Max Data Rate of ____ Mbps (per stream) with a max of ____ spatial streams and operates in ____ frequency band(s).

The 802.11n standard has a Max Data Rate of 150 Mbps (per stream) with a max of 4 spatial streams and operates in the 2.4 and 5 GHz frequency band(s).

From where is the BSSID value typically derived?

The MAC address of the radio card of the AP

What portion of a data frame can be encrypted?

The payload (Layer 3 and up)

If an attacker has the passphrase and a EAPOL handshake from User B on a WPA2-Personal network, what can that attacker decrypt?

Traffic from User B for that session after the handshake

This technique uses phase differentials of transmissions from omnidirectional antennas to focus energy on the intended recipient.

Transmit Beamforming

What network topologies are supported in ZigBee networks?

Tree, Star, or Mesh

Wi-Fi Calling is the marketing term used to identify the __________ technology.

UMA

In a 3G UMTS cellular network, the Radio Access Network portion of the network is called ______________.

UTRAN

The air interface between the user equipment (UE) and radio access network (RAN) in a 2G GSM network is called the _____ channel.

Um

An ACK is expected after what type of Wi-Fi frame?

Unicast

The air interface between the user equipment (UE) and radio access network (RAN) in a 3G UMTS network is called the _____ channel.

Uu

_________ (n) provides communications for implant and wearable electronics. Coverage is typically about 1 meter.

WBAN

__________ was the original encryption type available at the initial development of the IEEE 802.11 standard.

WEP

WEP encryption keys are either ____-bits or ____-bits in length.

WEP encryption keys are either 40 or 104

__________ (n) are typically designed to provide coverage for home and offices spaces but can be extended further. Wi-Fi is the most common protocol used.

WLAN

__________ (n) provide a dedicated communications channel that spans a city-sized area. Typically maintained by a service provider and leased to customer.

WMAN

__________ (n) were originally used to connect peripherals to a workstation but now used for many IoT implementations. Typically limited to 10 meters.

WPAN

A ________ (n) is a collection of devices which monitor and record aspects of the environment around them. Often operate in mesh environment in order to pass data node to node.

WSN

A _________ (n) covers large geographic area by aggregating/multiplexing multiple communication channels together.

WWAN

What kind of frame is a Beacon frame?

What kind of frame is a Beacon frame?

The ____________________________ is responsible for issuing certifications for inter-vendor compatibility of Wi-Fi standards.

Wi-Fi Alliance

What certification was developed to protect open public Wi-Fi hotspots using WPA3 features like Dragonfly Key Exchange and Opportunistic Wireless Encrypton?

Wi-Fi Certified Enhanced Open

Networks which include implants and wearable devices. Typical coverage up to 1 meter.

Wireless Body Area Network (WBAN

Wi-Fi devices operating in Wireless Bridge mode only associate with devices in ________________________ mode.

Wireless Bridge

Home and office networks. Most common protocol is Wi-Fi. Typical coverage up to 100 meters.

Wireless Local Area Network (WLAN)

Dedicated communication channels leased to customers by service providers. City-sized networks. Typical range up to 30 miles.

Wireless Metropolitan Area Networks (WMAN)

Wireless connection of peripheral devices via Bluetooth, ZigBee, Z-Wave, etc. Typical coverage area up to 10 meters.

Wireless Personal Area Networks (WPAN)

Groups of dedicated sensors to monitor and record their environment. Typically low-power/short-range communications deployed in mesh architecture .

Wireless Sensor Networks (WSN)

Connect widely separated networks via multiplexed channels. Regional to global connections.

Wireless Wide Area Networks (WWAN)

What are the 3 types of ZigBee devices?

ZigBee Coordinator (ZC) ZigBee Router (ZR) ZigBee End Device (ZED)

A wireless network topology that grants unauthenticated users limited network access is known as a __________.

a walled garden.

The ____________ attack attempts to establish a MitM position within an LTE network allowing attackers to potentially redirect web traffic and decrypt network-based encryption?

aLTEr

Examples of common sensors:

accelerometer, gyroscope, digital compass, ambient light sensor, and proximity sensor Turn

Amplifiers provide ______ (n) gain by injecting extra energy into the communications path between the radio the antenna.

active

The Bluetooth discovery method of ________ (n) uses inquiry scanning to find the BD_ADDRs of Bluetooth devices in discoverable mode.

active directory

________ (n) allows Classic Bluetooth devices to alter their hopping sequences to avoid channels with interference.

adaptive frequency hopping

What is the max range of operation for RFID systems?

approximately 300 feet

A typical QR code can store how many alphanumeric characters?

appx. 4000 (4296)

A typical QR code can store how many numeric characters?

appx. 7000 (7,089)

The_______ (n) aspect of the Information Assurance triad is often the hardest to ensure in wireless communications.

availability

Encryption attempts to address the inherent security risk of _______ (n)

confidentiality

Bluetooth devices advertise their BD_ADDR and device name when operating in the _____ (n) mode of operation.

discoverable

Bluetooth devices advertise their BD_ADDR and device name when operating in what mode of operation?

discoverable mode

On many mobile devices, the _______ (n) also functions as the primary input mechanism.

display

Of the two categories of cellular antennas, the _______ (n) is receive only

diversity

Mobile devices use _______ (n) memory for storage.

flash

LTE-M systems support ______ duplex operation.

full

NB-IoT systems support ______ duplex operation.

half

On a Classic Bluetooth protocol stack, the _______ (n) is the interface between the user-accessible protocols implemented on the Bluetooth host and the typically inaccessible protocols implemented on the Bluetooth controller.

host controller interface

The Bluetooth discovery method of ________ (n) attempts to guess the BD_ADDR as being "off-by-one" from the Wi-Fi MAC address of the same device.

hybrid discovery

Man-in-the-Middle attacks attempt to compromise the ________ (n) aspect of the Information Assurance triad.

integrity

What is the typical range of transmission for NFC?

less than 4 centimeters

What are the three parts of BD_ADDR?

non-significant address part (NAP), upper address part (UAP), and lower address part (LAP)

LTE-M systems support data rates up to _____ Mbps.

one

The trust model used on 2G GSM cellular networks is known as _____________________ authentication.

one-way

Mobile devices using operating systems or applications with publicly known vulnerabilities can be an example of the inherent security risk of ________ (n)

out of date software

In the 2.4 GHz ISM band, adjacent channels are ________. In the 5 GHz UNII band, adjacent channels are ____________

overlapping; non-overlaping

What are the types of an Highly-directional antenna?

parabolic dish and grid

Antennas provide ______(n) gain by focusing the radiation patter in a certain d

passive

he Bluetooth discovery method of ______ (n) uses visual inspection to look for a printed label revealing the BD_ADDR.

passive discovery

Stations perform ______________ carrier sense when, just prior to transmitting, they listen for another station transmitting and then wait an additional, random time.

physical

Mobile devices with weak or no passcodes is an example of the inherent security risk of __________ (n)

physical security

This tool conducts an offline brute force attack to recover the WPS PIN value

pixie dust

Mobile and wireless devices use a ________ (n) to access the RF physical layer.

radio adapter

An Access Point operating in repeater mode is also known as a __________.

range extender

Using a Wi-Fi repeater significantly ______________ throughput on the wireless segment of the network

reduces

Email phishing is an example of the inherent security risk of _______ (n)

social engineering

The _________ (n) contains the CPU, GPU, display and video processors, cellular modems and other hardware functionality required for the system.

system-on-a-chip

Bluetooth authentication is implemented through ________ (n) or ______ (n)

traditional pairing or secure simple pairing

Stations perform _____________ carrier sense when they wait for the NAV timer to count down to 0 before moving on to the next phase of the Clear Channel Assessment.

virtual

Unlike a Wireless Bridge, a Wireless Workgroup Bridge (WGB) network accepts associations from ______________ devices.

wireless client

What are the types of semi-directional antennas?

yagi, patch, panel, or sector


संबंधित स्टडी सेट्स

STUDY GUIDE Mendelian Genetics --- Chapter 6 & 7

View Set

les douze mois de l'année et les quatre saisons

View Set

Financial Accounting Exam 1 misc.

View Set