WiFi Security: WEP, WPA, and WPA-2

InexpensiveHydrogen avatar
InexpensiveHydrogen
·
·
Download

Start Quiz

Study Flashcards

24 Questions

What is the primary goal of WEP in WiFi security?

To provide data confidentiality similar to a wired network

What is the encryption method used by WEP?

RC4

What is the main problem with WEP's use of the RC4 cipher?

The starting variables must be unique, but are easily duplicated

How many distinct possibilities are there for 24-bit starting variables in WEP?

2^24

What is the estimated chance of duplicate starting variables occurring in WEP every 5000 packets?

52%

What is the attack that can be used to reverse engineer a WEP key by finding a correct starting variable?

Related key attack

What is the main difference between WPA and WPA2?

WPA2 uses CCMP, a derivative of AES, for password encryption

What type of attack is a Deauthentication Attack?

Man-in-the-middle attack

What is the purpose of a Deauthentication Attack?

To force computers to connect to a hacker's access point

What is the main goal of an Evil Twin attack?

To deceive someone into connecting to a fake access point

What is the purpose of a Denial of Service (DoS) attack?

To shut down an access point and prevent access to it

What is the method used by a hacker to perform a DoS attack on an access point?

Bombarding the access point with pings

What is the primary advantage of WPA over WEP?

Introduces the Temporal Key Integrity Protocol (TKIP)

What is the purpose of the Michael algorithm in WPA?

To provide a stronger checksum

What is a remaining vulnerability in WPA despite its improvements?

The ability to spoof shorter packets

What makes routers with WPS buttons still vulnerable to attacks?

The presence of vulnerabilities in WPS

What is the main reason brute force attacks are still possible in WPA?

The finite number of possible password combinations

What is the motivation behind developing an improved security protocol beyond WPA?

To eliminate vulnerabilities in WPA and WPS

What is the primary purpose of Network Cloaking?

To impede casual snoopers

What is the drawback of using MAC Filtering?

It can be easily hacked using MAC Spoofing

What is the purpose of RF Shielding?

To reduce the range of WiFi access

What is the vulnerability of Network Cloaking?

It can be easily hacked by advanced hackers

What is the main advantage of MAC Filtering?

It allows for whitelisting and blacklisting of devices

What is the weakness of RF Shielding?

It is vulnerable to moles from the inside

Test your knowledge of WiFi security algorithms, including Wired Equivalent Privacy (WEP), WPA, and WPA-2. Learn about the encryption methods, key lengths, and standards of each.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser