Section 6.13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following sends unsolicited business cards and messages to a Bluetooth device?

Bluejacking

Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?

Sniffing

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

802.11g & Bluetooth

Which of the following best describes an evil twin?

An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)

Check the MAC addresses of devices connected to your wired switch. Conduct a site survey.

Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?

Disable Bluetooth on the phone

You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpensive, consumergrade access point. While reading the documentation, you notice that the access point supports WiFi Protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce the risk

Disable WPS in the access point's configuration.

Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?

Encryption

An attacker has hidden an NFC reader behind an NFCbased kiosk in an airport. The attacker uses the device to capture NFC data in transit between enduser devices and the reader in the kiosk. She then uses that information later on to masquerade as the original enduser device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario?

NFC relay attack

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue access point

Match the malicious interference type on the right with the appropriate characteristic on the left. Each characteristic can be used once, more than once, or not at all.

Spark jamming - Repeatedly blasts receiving equipment with highintensity, shortduration RF bursts at a rapid pace Random noise jamming - Produces RF signals using random amplitudes and frequencies Random pulse jamming - Uses radio signal pulses of random amplitude and frequency

Your organization uses an 802.11g wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11n wireless network running in the 5 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system

Which of the following best describes Bluesnarfing?

Unauthorized viewing calendar, emails, and messages on a mobile device

Which of the following describes marks that attackers place outside a building to identify an open wireless network?

War chalking

The process of walking around an office building with an 802.11 signal detector known as what?

War driving


Conjuntos de estudio relacionados

study plan macroecon chapters 7 and 8

View Set

Quiz 9(a. b. & c.): Structured Assessment and Treatment Planning, Occlusion on Fixed Implant, Implant Configuration on Fixed Implant Prostheses Prosthesis

View Set

Principles of Coaching Final Part 4

View Set

3: Developing Project Schedules and Budgets

View Set

CH 15 Defense Mechanisms of the Gingiva

View Set

Section 3 - The Story of the Crusades

View Set

Security+ Cert Exam Objectives SYO-601

View Set

Chapter #1: The International Economy and Globalization

View Set

AST Exam 2 Review (Ch 5, 6, 14, 15

View Set

Pharmacology: Adrenergic Agonist/Blocking & Cholinergic Agonist/Blocking Drugs

View Set