Chapter 8: Wireless Network Security
Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP? (Enter letter for answer) A) It is a framework for transporting authentication protocols. B) It is a technology used by IEEE 802.11 for encryption. C) It is a subset of WPA2. D) It is the transport protocol used in TCP/IP for authentication.
A
Which of these is NOT a limitation of turning off the SSID broadcast from an AP? (Enter letter for answer) A) Users can more easily roam from one WLAN to another. B) The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP. C) Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another. D) Some versions of operating systems favor a network that broadcasts an SSID over one that does not.
A
Which of these is NOT a risk when a home wireless router is not securely configured? (Enter letter for answer) A) Only a small percentage of the total traffic can be encrypted. B) An attacker can steal data from any folder with file sharing enabled. C) User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. D) Malware can be injected into a computer connected to the WLAN.
A
What is the primary weakness of wired equivalent privacy (WEP)? (Enter letter for answer) A) It functions only on specific brands of APs. B) Its usage creates a detectable pattern. C) Initialization vectors (IVs) are difficult for users to manage. D) It slows down a WLAN from 104 Mbps to 16 Mbps.
B
Which of the following is NOT a wireless peripheral protection option? (Enter letter for answer) A) Switch to a more fully tested Bluetooth model. B) Install a network sensor to detect an attack. C) Substitute a wired device. D) Update or replacing any vulnerable device.
B
Which of the following is NOT true of a wireless router? (Enter letter for answer) A) It is also called a "residential WLAN gateway". B) It is most commonly used in an enterprise setting . C) It combines multiple features into a single hardware device. D) It often includes features of an access point (AP).
B
Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection? A) Bluestealing B) Bluejacking C) Bluecreeping D) Bluesnarfing
Bluesnarfing
What is a difference between NFC and RFID? A) RFID is faster than NFC. B) NFC devices cannot pair as quickly as RFID devices. C) RFID is designed for paper-based tags while NFC is not. D) NFC is based on wireless technology while RFID is not.
C
Which of these is a vulnerability of MAC address filtering? (Enter letter for answer) A) Not all operating systems support MACs. B) The user must enter the MAC. C) MAC addresses are initially exchanged unencrypted. D) APs use IP addresses instead of MACs.
C
Why is a rogue AP a security vulnerability? (Enter letter for answer) A) It requires the use of vulnerable wireless probes on all mobile devices. B) It conflicts with other network firewalls and can cause them to become disabled. C) It allows an attacker to bypass network security configurations. D) It uses the weaker IEEE 80211i protocol.
C
A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase? A) Any type of AP can be managed by a WLC. B) Fat AP C) Standalone AP D) Controller AP
Controller AP
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? A) EAP-TLS B) EAP-TTLS C) EAP-FAST D) EAP-SSL
EAP-FAST
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? A) PIN method B) Push-Button method C) NFC method D) piconet method
PIN method
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? A) Channel width B) Channel selection C) Frequency band D) RFID spectrum
RFID spectrum
WPA replaces WEP with ________. A) Message Integrity Check (MIC) B) Cyclic Redundancy Check (CRC) C) WPA2 D) Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP)
Which of these is NOT a type of wireless AP probe? A) WNIC probe B) dedicated probe C) wireless device probe D) AP probe
WNIC probe
AES-CCMP is the encryption protocol standard used in ________. A) IEEE 802.11 B) WPA2 C) WPA D) NFC
WPA2
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered? A) captive portal B) rogue portal C) authenticated portal D) web-based portal
captive portal
The primary design of a(n) ________ is to capture the transmissions from legitimate users. A) evil twin B) Bluetooth grabber C) rogue access point D) WEP
evil twin
Which technology is predominately used for contactless payment systems? A) Bluetooth B) wireless local area network (WLAN) C) Radio Frequency ID (RFID) D) near field communication (NFC)
near field communication (NFC)