CompTIA Security+ Exam SY0-501 Wireless Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

The practice of sending unsolicited messages over Bluetooth is called:

• Bluejacking

Gaining unauthorized access to a Bluetooth device is referred to as:

• Bluesnarfing

AES-based encryption mode implemented in WPA2 is known as:

• CCMP

Which of the answers listed below refers to a solution allowing administrators to block Internet access for users until they perform required action?

• Captive portal

A wireless disassociation attack is a type of:

• Denial of Service (Dos) attack

A wireless jamming attack is a type of:

• Denial of Service (Dos) attack

Which of the EAP methods listed below relies on client-side and server-side certificates to perform authentication?

• EAP-TLS

Which of the following EAP methods offers the highest level of security?

• EAP-TLS

A type of wireless attack designed to exploit vulnerabilities of WEP is known as:

• IV attack

What is the name of a technology used for contactless payment transactions?

• NFC

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

• RFID

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)

• Suitable for large corporate networks • Requires RADIUS authentication server

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:

• TKIP

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.

• True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.

• True

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks.

• True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.

• True

Which of the following security protocols is the least susceptible to wireless replay attacks?

• WPA2-CCMP

Which of the following would be the best solution for securing a small network lacking an authentication server?

• WPA2-PSK

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)

• WPS • WEP


Conjuntos de estudio relacionados

Bloomberg course part 4 - Equities

View Set

Operations Management - Chapter 11 In Class Questions

View Set

Mathematics: Reasoning and Problem Solving

View Set

The 11th Amendment and State Sovereign Immunity

View Set

Governmental and Not-For-Profit Final Ch. 10,11,12,13

View Set

Chapter 2: Describing Data: Frequency Tables, Frequency Distributions,

View Set