24 Questions
What is the primary goal of WEP in WiFi security?
To provide data confidentiality similar to a wired network
What is the encryption method used by WEP?
RC4
What is the main problem with WEP's use of the RC4 cipher?
The starting variables must be unique, but are easily duplicated
How many distinct possibilities are there for 24-bit starting variables in WEP?
2^24
What is the estimated chance of duplicate starting variables occurring in WEP every 5000 packets?
52%
What is the attack that can be used to reverse engineer a WEP key by finding a correct starting variable?
Related key attack
What is the main difference between WPA and WPA2?
WPA2 uses CCMP, a derivative of AES, for password encryption
What type of attack is a Deauthentication Attack?
Man-in-the-middle attack
What is the purpose of a Deauthentication Attack?
To force computers to connect to a hacker's access point
What is the main goal of an Evil Twin attack?
To deceive someone into connecting to a fake access point
What is the purpose of a Denial of Service (DoS) attack?
To shut down an access point and prevent access to it
What is the method used by a hacker to perform a DoS attack on an access point?
Bombarding the access point with pings
What is the primary advantage of WPA over WEP?
Introduces the Temporal Key Integrity Protocol (TKIP)
What is the purpose of the Michael algorithm in WPA?
To provide a stronger checksum
What is a remaining vulnerability in WPA despite its improvements?
The ability to spoof shorter packets
What makes routers with WPS buttons still vulnerable to attacks?
The presence of vulnerabilities in WPS
What is the main reason brute force attacks are still possible in WPA?
The finite number of possible password combinations
What is the motivation behind developing an improved security protocol beyond WPA?
To eliminate vulnerabilities in WPA and WPS
What is the primary purpose of Network Cloaking?
To impede casual snoopers
What is the drawback of using MAC Filtering?
It can be easily hacked using MAC Spoofing
What is the purpose of RF Shielding?
To reduce the range of WiFi access
What is the vulnerability of Network Cloaking?
It can be easily hacked by advanced hackers
What is the main advantage of MAC Filtering?
It allows for whitelisting and blacklisting of devices
What is the weakness of RF Shielding?
It is vulnerable to moles from the inside
Test your knowledge of WiFi security algorithms, including Wired Equivalent Privacy (WEP), WPA, and WPA-2. Learn about the encryption methods, key lengths, and standards of each.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free