WiFi Security: WEP, WPA, and WPA-2
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of WEP in WiFi security?

  • To provide authentication for users
  • To provide data confidentiality similar to a wired network (correct)
  • To encrypt data using the AES cipher
  • To improve the speed of WiFi connections

What is the encryption method used by WEP?

  • RC4 (correct)
  • MD5
  • AES
  • SHA-256

What is the main problem with WEP's use of the RC4 cipher?

  • The cipher is too slow
  • The starting variables must be unique, but are easily duplicated (correct)
  • The cipher is not widely supported
  • The cipher is too complex

How many distinct possibilities are there for 24-bit starting variables in WEP?

<p>2^24 (B)</p> Signup and view all the answers

What is the estimated chance of duplicate starting variables occurring in WEP every 5000 packets?

<p>52% (B)</p> Signup and view all the answers

What is the attack that can be used to reverse engineer a WEP key by finding a correct starting variable?

<p>Related key attack (D)</p> Signup and view all the answers

What is the main difference between WPA and WPA2?

<p>WPA2 uses CCMP, a derivative of AES, for password encryption (A)</p> Signup and view all the answers

What type of attack is a Deauthentication Attack?

<p>Man-in-the-middle attack (C)</p> Signup and view all the answers

What is the purpose of a Deauthentication Attack?

<p>To force computers to connect to a hacker's access point (D)</p> Signup and view all the answers

What is the main goal of an Evil Twin attack?

<p>To deceive someone into connecting to a fake access point (A)</p> Signup and view all the answers

What is the purpose of a Denial of Service (DoS) attack?

<p>To shut down an access point and prevent access to it (C)</p> Signup and view all the answers

What is the method used by a hacker to perform a DoS attack on an access point?

<p>Bombarding the access point with pings (D)</p> Signup and view all the answers

What is the primary advantage of WPA over WEP?

<p>Introduces the Temporal Key Integrity Protocol (TKIP) (B)</p> Signup and view all the answers

What is the purpose of the Michael algorithm in WPA?

<p>To provide a stronger checksum (A)</p> Signup and view all the answers

What is a remaining vulnerability in WPA despite its improvements?

<p>The ability to spoof shorter packets (D)</p> Signup and view all the answers

What makes routers with WPS buttons still vulnerable to attacks?

<p>The presence of vulnerabilities in WPS (C)</p> Signup and view all the answers

What is the main reason brute force attacks are still possible in WPA?

<p>The finite number of possible password combinations (A)</p> Signup and view all the answers

What is the motivation behind developing an improved security protocol beyond WPA?

<p>To eliminate vulnerabilities in WPA and WPS (D)</p> Signup and view all the answers

What is the primary purpose of Network Cloaking?

<p>To impede casual snoopers (D)</p> Signup and view all the answers

What is the drawback of using MAC Filtering?

<p>It can be easily hacked using MAC Spoofing (A)</p> Signup and view all the answers

What is the purpose of RF Shielding?

<p>To reduce the range of WiFi access (D)</p> Signup and view all the answers

What is the vulnerability of Network Cloaking?

<p>It can be easily hacked by advanced hackers (D)</p> Signup and view all the answers

What is the main advantage of MAC Filtering?

<p>It allows for whitelisting and blacklisting of devices (D)</p> Signup and view all the answers

What is the weakness of RF Shielding?

<p>It is vulnerable to moles from the inside (A)</p> Signup and view all the answers

Flashcards

WEP Goal

WEP aims to provide data confidentiality like a wired network.

WEP Encryption

WEP uses RC4 encryption.

WEP RC4 Problem

WEP's RC4 has starting variables easily duplicated, leading to vulnerabilities.

WEP Starting Variables

WEP has 2^24 possible starting variables leading to weak keys.

Signup and view all the flashcards

WEP Duplicate Chance

There's a high chance of duplicate starting variables in WEP, every 5000 packets.

Signup and view all the flashcards

Related Key Attack

An attack to reverse engineer a WEP key by finding a correct starting variable.

Signup and view all the flashcards

WPA vs WPA2 Difference

WPA2 uses CCMP (a derivative of AES) for encryption, while WPA uses TKIP.

Signup and view all the flashcards

Deauthentication Attack

A man-in-the-middle attack that forces devices to connect to a hacker's access point.

Signup and view all the flashcards

Evil Twin Attack

A deceptive attack where a hacker creates a fake access point.

Signup and view all the flashcards

DoS Attack

Denial of Service attacks flood an access point to shut it down.

Signup and view all the flashcards

DoS Method

Hackers use pings to overwhelm an access point and shut it down.

Signup and view all the flashcards

WPA Improvement

WPA improves upon WEP by introducing TKIP (Temporal Key Integrity Protocol).

Signup and view all the flashcards

Michael Algorithm

A stronger checksum used in WPA to verify data integrity.

Signup and view all the flashcards

WPA Vulnerability

WPA still has a vulnerability to attacks related to packet spoofing.

Signup and view all the flashcards

WPS Vulnerability

Routers with WPS buttons can still be exploited because of inherent vulnerabilities.

Signup and view all the flashcards

WPA Brute Force

Brute force attacks are still possible in WPA because of the finite number of passwords.

Signup and view all the flashcards

Improved Security Protocol

Protocols beyond WPA aim to fix vulnerabilities in WPA and WPS, ensuring enhanced security.

Signup and view all the flashcards

Network Cloaking

Network cloaking aims to make a network harder to detect by casual snoopers.

Signup and view all the flashcards

MAC Filtering Weakness

MAC filtering can be easily hacked using MAC spoofing attacks.

Signup and view all the flashcards

RF Shielding Purpose

RF shielding reduces the range of WiFi access.

Signup and view all the flashcards

Network Cloaking Vulnerability

Network cloaking can still be hacked by advanced hackers.

Signup and view all the flashcards

MAC Filtering Advantage

MAC filtering allows controlling which devices connect by whitelisting or blacklisting.

Signup and view all the flashcards

RF Shielding Weakness

RF shielding can be compromised if someone inside knows how to do it.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser