Chapter 3 Review Questions 1. _____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information. a. Phishing b. Social engineering c. Resource allocation (RA) d. Web posting 2. Wireless location mapping refers to passive wireless discovery, also known as a. wardriving b. wireless address allocation (WAA) c. spear driving d. access point collecting 3. Each of the following is a technique used by wardrivers except a. Drive at slower speeds b. Use freeways or Interstate highways c. Repeat over time d. Divide the area into sectors 4. Each of the following is a necessary piece of hardware for wardriving except a. automobile b. computing device c. antenna d. wireless NIC adapter 5. A _____computer that lacks a keyboard. a. convertible table b. handheld PC c. desktop d. slate tablet 6. Social engineering relies on tricking and deceiving someone to access a system. True or False? 7. Whereas phishing involves sending millions of generic e-mail messages to users, spear phishing targets only specific users. True or False? 8. Google phishing involves stealing information from the Google Web site that contains personal information. True or False? 9. Attackers use search tools to locate information that is no intended for the general public. True or False? 10. Handheld PCs outsell PDAs by a 2-to-1 margin. True or False? 11. The smallest mobile computing device is a(n) _____, which are handheld devices that were originally designed strictly as personal organizers but quickly became more sophisticated. personal digital assistants (PDA), 12. For laptop, tablet and handheld PCs an external wireless NICs can plug into the _____ port, as either as a standalone device or a key fob. USB Comment [dk1]: This could arguably be smartphones now. Rewrite question? 13. A(n) _____is a small card that is functionally equivalent to a standard PCI expansion card and is used for wireless NIC adapters in laptop computers. mini PCI 14. Not all chipsets support _____, which is a passive method of receiving WLAN signals. radio frequency monitoring (RFMON) 15. GPS receivers can deduce their own location based on the mathematical principle of _____. trilateration 16. Describe the two fundamental characteristics of antennas. First, as the frequency gets higher the wavelength becomes smaller. This means that the size of the antenna likewise is smaller. Consider a cellular telephone: it uses a high frequency so only a small antenna is required. Secondly, as the gain (positive difference in amplitude between two signals) of an antenna increases, the coverage area narrows. High-gain antennas offer longer coverage areas than low-gain antennas at the same input power level. 17. What are the three types of antennas? What type(s) are commonly used to detect wireless networks? There are three basic categories of antennas: omni-directional, semi-directional and highly-directional. The most common type of antenna for a WLAN, whether wardriving or in standard use, is an omni-directional antenna, also known as a dipole antenna. An omni-directional antenna detects a from all directions equally. Unlike an omni-directional antenna that evenly spreads the signal in all directions, a semi-directional antenna focuses the energy in one direction. Semi-directional antennas are primarily used for short and medium range remote wireless bridge networks. Highly-directional antennas send a narrowly focused signal beam. Highly-directional antennas are generally concave dish-shaped devices. These antennas are used for long distance, point-to-point wireless links, such as connecting buildings that are up to 42 kilometers (25 miles) apart. Neither semi-directional or highly-directional antennas are commonly used for WLAN wardriving. 18. What is a wireless client utility and why were they used? When WLANs first appeared operating systems were unaware of their presence. Wireless NIC adapter manufacturers included client software utilities that were used to detect a wireless signal and then connect to that network. These client utilities also provided the ability to adjust client parameters, report statistics, and show signal strength. However, the popularity of client utilities has decreased. Few wireless NIC adapter manufacturers now include client software utilities to accompany their hardware. In addition, some of those that do make the utilities available configure the software not to function unless that vendor’s specific wireless NIC is installed and functioning in the computer. 19. What is warchalking? The final step in wardriving is to document and then advertise the location of the wireless LANs. Early WLAN users copied a system that “hobos” used during the Great Depression to indicate friendly locations. Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as warchalking. This system relied on a series of symbols. 20. How are wireless networks vulnerable to wireless packet sniffers, and how do you protect against this vulnerability? Wireless packet sniffers can be used by attackers to capture unencrypted packets and view their contents. Wireless packet sniffers can reveal usernames and passwords, SNMP community strings, encryption keys, and MAC addresses. The best preventative measures for protecting against this data being viewed is to enrypt the packets before they are transmitted.