WiFi Security: WEP, WPA, and WPA-2
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of WEP in WiFi security?

  • To provide authentication for users
  • To provide data confidentiality similar to a wired network (correct)
  • To encrypt data using the AES cipher
  • To improve the speed of WiFi connections
  • What is the encryption method used by WEP?

  • RC4 (correct)
  • MD5
  • AES
  • SHA-256
  • What is the main problem with WEP's use of the RC4 cipher?

  • The cipher is too slow
  • The starting variables must be unique, but are easily duplicated (correct)
  • The cipher is not widely supported
  • The cipher is too complex
  • How many distinct possibilities are there for 24-bit starting variables in WEP?

    <p>2^24</p> Signup and view all the answers

    What is the estimated chance of duplicate starting variables occurring in WEP every 5000 packets?

    <p>52%</p> Signup and view all the answers

    What is the attack that can be used to reverse engineer a WEP key by finding a correct starting variable?

    <p>Related key attack</p> Signup and view all the answers

    What is the main difference between WPA and WPA2?

    <p>WPA2 uses CCMP, a derivative of AES, for password encryption</p> Signup and view all the answers

    What type of attack is a Deauthentication Attack?

    <p>Man-in-the-middle attack</p> Signup and view all the answers

    What is the purpose of a Deauthentication Attack?

    <p>To force computers to connect to a hacker's access point</p> Signup and view all the answers

    What is the main goal of an Evil Twin attack?

    <p>To deceive someone into connecting to a fake access point</p> Signup and view all the answers

    What is the purpose of a Denial of Service (DoS) attack?

    <p>To shut down an access point and prevent access to it</p> Signup and view all the answers

    What is the method used by a hacker to perform a DoS attack on an access point?

    <p>Bombarding the access point with pings</p> Signup and view all the answers

    What is the primary advantage of WPA over WEP?

    <p>Introduces the Temporal Key Integrity Protocol (TKIP)</p> Signup and view all the answers

    What is the purpose of the Michael algorithm in WPA?

    <p>To provide a stronger checksum</p> Signup and view all the answers

    What is a remaining vulnerability in WPA despite its improvements?

    <p>The ability to spoof shorter packets</p> Signup and view all the answers

    What makes routers with WPS buttons still vulnerable to attacks?

    <p>The presence of vulnerabilities in WPS</p> Signup and view all the answers

    What is the main reason brute force attacks are still possible in WPA?

    <p>The finite number of possible password combinations</p> Signup and view all the answers

    What is the motivation behind developing an improved security protocol beyond WPA?

    <p>To eliminate vulnerabilities in WPA and WPS</p> Signup and view all the answers

    What is the primary purpose of Network Cloaking?

    <p>To impede casual snoopers</p> Signup and view all the answers

    What is the drawback of using MAC Filtering?

    <p>It can be easily hacked using MAC Spoofing</p> Signup and view all the answers

    What is the purpose of RF Shielding?

    <p>To reduce the range of WiFi access</p> Signup and view all the answers

    What is the vulnerability of Network Cloaking?

    <p>It can be easily hacked by advanced hackers</p> Signup and view all the answers

    What is the main advantage of MAC Filtering?

    <p>It allows for whitelisting and blacklisting of devices</p> Signup and view all the answers

    What is the weakness of RF Shielding?

    <p>It is vulnerable to moles from the inside</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser