Wirless Final
Which type of interference is caused by multipath? A) Wideband interference B) Narrowband interference C) Physical interference D) All-band interference E) Intersymbol interference
E) Intersymbol interference
AES has been cracked A) True B) False
false
WPA2-PSK (Pre-Shared Key) with AES may be vulnerable to authentication cracking A) True B) False
true
An attacker completes a DoS attack on your wireless network . Which security concept in the CIA security triad has been compromised? A) Availability B) IDK C) Confidentiality D) Integrity
A) Availability
Based on RSSI metrics, concentric zones of variable data rate coverage exist around an access point due to the upshifting and downshifting of client stations between data rates. What is the correct name of this process, according to the IEEE 802.11-2007 standard? A) Dynamic rate switching B) Automatic rate selection C) Adaptive rate selection D) All of the above
A) Dynamic rate switching
802.11n is backward compatible with which of the following type of 802.11 radios? (Choose Three) A) ERP-OFDM (802.11g) B) HR-DSSS (802.11b) C) FHSS (802.11 Legacy / Bluetooth) D) OFDM (802.11a)
A) ERP-OFDM (802.11g) C) FHSS (802.11 Legacy / Bluetooth) D) OFDM (802.11a)
An attacker wants to steal data from users on an open and unsecured hotspot at a coffee shop. Which type of attack might the attacker use? A) Eavesdropping B) Encryption Cracking C) PSK Cracking D) Denial of Service
A) Eavesdropping
What are some of the negative effects of layer 2 retransmissions? (Choose Three) A) Excessive MAC sublayer overhead B) Decreased range C) Increased latency D) Decreased latency E) Jitter
A) Excessive MAC sublayer overhead C) Increased latency E) Jitter
Why would a WLAN network administrator consider disabling the two lowest rates on an 802.11b/g access point? (Choose Two) A) Hidden node B) Co-channel interference C) Medium contention D) Adjacent cell interference
A) Hidden node C) Medium contention
You have failed to remove the default user id and password from your wireless access point before placing it into production. Which type of attack have you left yourself very vulnerable to? A) Management Interface Exploits B) PSK Cracking C) Authentication Cracking D) Encryption Cracking
A) Management Interface Exploits
What can be done to fix the hidden node problem? (Choose Three) A) Remove the obstacle B) Move the hidden node station C) Increase the power on the access point D) Increase power on all client stations E) Decrease power on the hidden node station
A) Remove the obstacle B) Move the hidden node station D) Increase power on all client stations
Which of the following factors indicate that a RSN is being used? (Choose Two) A) Secure 4-way handshake authentication B) WEP is being used as the cipher suite C) Dynamic Encryption Keys D) RBAC features have been turned on
A) Secure 4-way handshake authentication C) Dynamic Encryption Keys
Which of the following are designed to substantially increase throughput in a HT system? (Choose the three best answers) A) Short Guard Interval B) Transmit Beamforming C) Maximal Ratio Combining D) 40 MHz Channel Bonding E) Spatial Multiplexing
A) Short Guard Interval D) 40 MHz Channel Bonding E) Spatial Multiplexing
Which WLAN architecture can use the 40 MHz OFDM channel capabilities of an 802.11n access point in the 2.4 GHz ISM band using a single channel blanket? A) Single channel architecture B) None of the above C) Distributed WLAN architecture D) Unified architecture E) Multiple channel architecture
A) Single channel architecture
The process of using multiple antennas to listen to the received signal and selecting the single antenna with the best RSSI and SNR to receive the entire transmission is known as? A) Switched Diversity B) Selective Diversity C) Simple diversity D) Maximal Ratio Combining
A) Switched Diversity
Which of the following can cause roaming problems? (Choose Two) A) Too little cell coverage overlap B) CSMA/CA C) Hidden node D) Too much cell coverage overlap E) Free space path loss
A) Too little cell coverage overlap D) Too much cell coverage overlap
What PHY layer mechanism might be used to increase the range for an 802.11n radio using a MIMO system? (Choose Two) A) Transmit beamforming B) Short Guard interval C) Switched diversity D) Spatial multiplexing
A) Transmit beamforming C) Switched diversity
Which of the following would be the most secure option for an Enterprise WLAN implementation? A) WPA2 + EAP / CCMP B) WPA2-PSK / CCMP C) WPA2 + EAP / TKIP D) WPA-PSK / TKIP
A) WPA2 + EAP / CCMP
Two ways to prevent peer to peer attacks on a public hotspot include: (Choose Two) A) Walled Garden B) Public Secure Packet Forwarding / Peer to Peer Drop C) Strong Encryption D) Client Firewalls
A) Walled Garden D) Client Firewalls
If you fail to keep logs on user activity in your network environment, which AAA concept have you failed to implement? A) Attack Logging B) Accounting C) Authentication D) Authorization
B) Accounting
Which of these capabilities are considered mandatory for the Wi-Fi Alliance's vendor certification program called Wi-Fi Certified 802.11n draft 2.0? A) Support for two transmit spatial streams B) All of the above C) Support for aggregate frames A-MSDU and AMPDU D) Support for block acknowledgements E) Support for two receive spatial streams
B) All of the above
What are some problems that can occur when an access point is transmitting at full power? (Choose Three) A) Adjacent cell interference B) Co-channel interference C) Hidden node D) Intersymbol interference E) Mismatched power between the AP and the clients
B) Co-channel interference C) Hidden node E) Mismatched power between the AP and the clients
You receive calls from five different users in a 10-minute window of time. Each of them tells you that the WLAN is no longer available. You connect to the IP address of the AP across the wired network and can connect with no problem. This reveals that the AP is still running fine. What kind of attack is likely to be occurring? A) Encryption Cracking B) Denial of Service C) Hijacking D) Management Interface Exploit
B) Denial of Service
What scenarios might result in a hidden node problem? (Choose Three) A) Co-channel interference B) Distributed antenna system C) Physical obstruction D) Too small coverage cell E) Too large coverage cell
B) Distributed antenna system C) Physical obstruction E) Too large coverage cell
What is the major weakness of MAC filtering? A) MAC addresses can be easily guessed B) MAC addresses can be easily spoofed C) There are no weaknesses to MAC filtering D) MAC addresses are not long enough
B) MAC addresses can be easily spoofed
How does an HT system acknowledge frames from an aggregate frame transmission such as A-MPDU? A) It does not need to acknowledge these types of frame transmissions B) MTBA C) It sends a separate ACK frame for each frame in the frame-burst or aggregate frame transmission D) RIFS
B) MTBA
While performing a penetration test on a WLAN, you attempt to connect to the IP address of the AP in a web browser. Your connection is denied when connecting through the WLAN. What attack method is being protected against in this scenario? A) Authentication Cracking B) Management Interface Exploits C) Denial of Service D) Encryption Cracking
B) Management Interface Exploits
The process of receiving multiple streams of the same data across multiple radios and optimally combining those streams to re-construct the best received signal is known as? A) Switched Diversity B) Maximal Ratio Combining C) Selective Diversity D) Simple diversity
B) Maximal Ratio Combining
What type of solution may be deployed to provide continuous connectivity when a client station roams across layer 3 boundaries? A) Nomadic roaming solution B) Mobile IP solution C) Fast Secure Roaming solution D) Seamless roaming solution
B) Mobile IP solution
You are the network administrator for an Enterprise network consisting of 200 coffee shops across the United States. You want to provide Wireless Guest Internet Access to customers at each location. Which Authentication and Encryption method would be typical for providing Wireless Internet Access to coffee shop customers (Wireless Hotspots)? A) Open Authentication / WEP-RC4 Encryption B) Open Authentication / No Encryption C) Open Authentication / WPA2-EAP AES Encryption D) Open Authentication / WPA-PSK TKIP Encryption
B) Open Authentication / No Encryption
If you connect to a wireless hotspot and you do not have Windows Firewall or another third-party firewall enabled on your device, you have left yourself open to which type of attack? A) PSK Cracking B) Peer-to-Peer Attacks C) Encryption Cracking D) Authentication Cracking
B) Peer-to-Peer Attacks
What variables might affect range in an 802.11 WLAN? (Choose Three) A) CSMA/CA B) Physical environment C) Encryption D) Antenna gain E) Transmission power
B) Physical environment D) Antenna gain E) Transmission power
Which of these attacks will not be detected by a WIDS? A) Association flood B) Protocol Analyzer (Evesdropping) C) MAC spoofing D) De-authentication Spoofing E) Rogue Access Point
B) Protocol Analyzer (Evesdropping)
You want to place users on different network segments once they authenticate based on the users role. Which technology will help you achieve this? A) Wireless Intrusion Prevention Systems B) RBAC C) WPA D) 802.11i
B) RBAC
Which encryption algorithm is used by the WEP cipher suite? A) 3DES B) RC4 C) AES D) RSA
B) RC4
Which new power management method defined by the 802.11n amendment conserves power by powering down all but one radio? A) PSMP B) SM Power Save C) PS Mode D) A-MPDU E) Power Save Protection
B) SM Power Save
Which cipher suites are available in WPA? (Choose all that apply) A) CCMP-RSA B) TKIP-RC4 C) TKIP-AES D) CCMP-AES
B) TKIP-RC4
Which IEEE Standard defines the framework for port-based authentication? A) 802.1q B) EAP C) 802.1X D) 802.11i
C) 802.1X
Which encryption algorithm is used by the CCMP cipher suite? A) RC4 B) RSA C) AES D) 3DES
C) AES
An attacker is flooding your wireless service area with spoofed de-authentication frames. What type of attack is being performed? A) PSK Cracking B) Eavesdropping C) Denial of Service D) Encryption Cracking
C) Denial of Service
An attacker starts a software-based AP on his laptop. He then scans for the SSID of the AP at the coffee shop hotspot where he is located. He sets his software-based AP to the same SSID. What type of attack is he likely beginning? A) Encryption Cracking B) Authentication Cracking C) Hijacking D) Denial of Service
C) Hijacking
The guard interval is used as a buffer to compensate for what type of interference? A) RF interference B) Adjacent cell interference C) Intersymbol interference D) HT interference E) Co-channel interference
C) Intersymbol interference
You are the network administrator for a Small Business named Pizza2Go. The single AP your organization uses is configured with WPA-PSK, and the pre-shared key is set to your company name followed by the number 7. Is this a secure implementation and why? A) Yes. It is secure because WPA-PSK resolved the problems with WEP. B) No. Because WPA-PSK is just as insecure as WEP, it should never be used. C) No. Because it only includes the company name plus one digit, it could be easily guessed. D) Yes. It is secure because the pre-shared key is at least five characters long.
C) No. Because it only includes the company name plus one digit, it could be easily guessed.
A hacker convinces an IT staff member that he is an employee of the company and has the IT staff member program the company's pre-shared key into his laptop so that he may access the corporate wireless network. This is an example of which type of attack? A) PSK Cracking B) Authentication Cracking C) Social Engineering D) Eavesdropping
C) Social Engineering
Which security solution may be used to segment a LAN or wireless LAN A) CCMP B) TKIP C) VLAN D) WEP
C) Vlan
When using an 802.11 wireless controller solution with an 802.1x framework, which device would be considered the authenticator? A) Access Point B) LDAP C) WLAN Controller D) RADIUS Server E) VLAN
C) WLAN Controller
Which wireless security implementation would be the most secure option for SOHO WLAN implementation which do not have RADIUS servers available? A) WPA-PSK / TKIP B) WPA2 + EAP / TKIP C) WPA2-PSK / CCMP D) WPA2 + EAP / CCMP
C) WPA2-PSK / CCMP
What PHY layer mechanism might be used to increase throughput for an HT radio in a clean RF environment with minimal reflections and low multipath? A) Maximum Ratio Combining B) Spatial diversity C) Switched diversity D) 400-nanosecond guard interval
D) 400-nanosecond guard interval
Name some of the factors that a modulation and coding scheme (MCS) uses to define data rates for an HT radio. A) Modulation Method B) Guard Interval C) Channel size D) All of the above E) Number of spatial streams
D) All of the above
What are some problems with rogue access points? A) They may allow unsecured access into your LAN B) They may interfere with RF channel settings on production APs C) Users may unknowingly connect to the rogue AP and expose sensitive data D) All of the above
D) All of the above
Which of the following are weaknesses of WEP? A) Weak IVs (Initialization Vectors) B) Short User Encryption Keys (40-bit and 104-bit) C) Lack of support for dynamic encryption keys D) All of the above
D) All of the above
How can a MIMO system increase throughput at the physical layer? (Choose Two) A) 40MHZ channels B) A-MPDU C) Spatial Multiplexing D) Dual-CTS protection
A) 40MHZ channels C) Spatial Multiplexing
Why would you recommend 5GHz over 2.4GHz for new 802.11n implementations? A) 40MHz channels do not scale in the 2.4GHz ISM band B) HT radios get better range using TxBF in the 5GHz band C) HT radios do not require DFS and TPC in 5 GHz bands D) 5 GHz HT radios are less expensive than 2.4GHz HT radios
A) 40MHz channels do not scale in the 2.4GHz ISM band
What type of interference is caused by overlapping coverage cells with overlapping frequencies? A) Adjacent cell interference B) Narrowband interference C) Inter-symbol interference D) All-band interference E) Co-channel interference
A) Adjacent cell interference
Layer 2 retransmissions occur when frames become corrupted. What are some of the causes of layer 2 retries? (Choose Four) A) Adjacent cell interference (Adjacent Channel Interference) B) Co-channel interference C) Low SNR D) Multipath E) RF interference
A) Adjacent cell interference (Adjacent Channel Interference) C) Low SNR D) Multipath E) RF interference
What three main components constitute an 802.1X/EAP framework? (Choose Three) A) Authenticator B) Network Access Control C) Authorizer D) Authentication Server E) Supplicant
A) Authenticator D) Authentication Server E) Supplicant
You are running a wireless network with WPA2-PSK using AES encryption. Your pre-shared key contains words found in the English dictionary and does not follow best practices for complexity. Which attack have you left yourself open to? A) Encryption Cracking B) Eavesdropping C) Denial of Service D) Authentication Cracking
D) Authentication Cracking
What is the primary method of increasing capacity in a multi-channel architecture 802.11 WLAN? A) Unified architecture B) High gain antennas C) Increase AP power D) Cell sizing
D) Cell sizing
If the access points transmit on the same frequency channel in a multi-channel (MCA) architecture, what type of interference is caused by overlapping coverage cells? A) Intersymbol Interference (ISI) B) Narrowband interference C) Adjacent cell interference D) Co-channel interference E) All-band interference
D) Co-channel interference
A hacker cracks your WEP key and then eavesdrops on data from your wireless network. Which security concept in the CIA security triad has been compromised? A) IDK B) Availability C) Integrity D) Confidentiality
D) Confidentiality
What is the most common way to overcome multipath in an indoor environment? A) Increase client power B) Eliminate the source of the multipath interference C) Increase AP power D) Diversity Antenna Systems
D) Diversity Antenna Systems
The best way to prevent Social Engineering Attacks is: A) Strong Passwords B) Wireless Intrusion Prevention Systems C) Strong Encryption D) Employee and End User Training
D) Employee and End User Training
Which key is used to decrypt broadcast and multicast traffic in a WPA / WPA2 implementation? A) PTK B) PMK C) MIC D) GTK
D) GTK
A single user is complaining that her VoWiFi phone has choppy audio. The WLAN administrator notices that the user's MAC address has a retry rate of 25 percent when observed with a protocol analyzer. However, all the other users have a retry rate of about 5 percent when also observed with the protocol analyzer. What is the most likely cause of this problem? A) Co-channel interference B) Low SNR C) Multipath D) Hidden node E) Near/far
D) Hidden node
What frequencies are defined for 802.11n HT radio transmissions? (Choose Two) A) 902-928 MHz B) 2.4 - 2.4835 GHz C) 5.15-5.25 GHz D) 5.25-5.35 MHZ
B) 2.4 - 2.4835 GHz C) 5.15-5.25 GHz
Which of the following are designed to substantially increase resiliency in a HT system? (Choose the two best answers) A) Spatial Multiplexing B) Transmit Beamforming C) 40 MHz Channel Bonding D) Short Guard Interval E) Maximal Ratio Combining
B) Transmit Beamforming E) Maximal Ratio Combining
Which wireless security implementation offers this highest level of security available using today's standards? A) WPA2-RSA B) WPA2-AES C) WPA-TKIP D) WPA2-TKIP
B) WPA2-AES
Which of the following can notify the network administrator of a wide variety of wireless attacks when they are detected but cannot attempt to mitigate the attack? A) Wireless IPS B) Wireless IDS C) SNMP based network monitoring system D) Stateful Packet Firewall
B) Wireless IDS
Which of the following can notify the network administrator of a wide variety of wireless attacks when they are detected as well as respond to the attack by changing the network environment in an attempt to prevent or mitigate the attack? A) Stateful Packet Firewall B) SNMP based network monitoring system C) Wireless IPS D) Wireless IDS
C) Wireless IPS
What variables might affect range in an 802.11 WLAN? A) Wavelength B) Free space path loss C) Brick walls D) Trees E) All of the above
E) All of the above
Which of these weather conditions is a concern when deploying a long-distance point-to-point bridge link? A) Wind B) Rain C) Fog D) Changes in air temperature E) All of the above
E) All of the above
Which HT PPDU formats support both 20MHz and 40MHz channels as well as both legacy and HT devices? A) HT Mixed mode B) HT Greenfield mode C) PCO mode D) Non-HT legacy
D) Non-HT legacy
Which key is used to encrypt and decrypt unicast traffic between a client station and AP in a WPA / WPA 2 implementation? A) PMK B) MIC C) GTK D) PTK
D) PTK
This type of architecture has zero handoff time and all access points have the same BSSID A) Unified Architecture B) Multi-channel Architecture C) Distributed Architecture D) Single-channel Architecture
D) Single-channel Architecture
Transmit beamforming uses which type of frames to analyze the MIMO channel before transmitting directed paths of data? A) SM power save action frames B) Beaming Frames C) Action Frames D) Sounding Frames E) Trigger Frames
D) Sounding Frames
Which tool is normally used to discover sources of RF interference? A) InSSIDer B) Packet Analyzer C) Net Stumbler D) Spectrum Analyzer
D) Spectrum Analyzer
Which current wireless security standard is 802.11i compliant? A) WEP B) EIEIO C) WPA D) WPA2
D) WPA2
The manager of the factory where you work as a network technician has asked you to implement a secure WLAN. In your research, you determine that your organization should implement AES encryption and 802.1X with EAP authentication and key management protocol. Which Wi-Fi Alliance certification will meet your needs? A) WPA-Personal B) WPA2-Personal C) WPA-Enterprise D) WPA2-Enterprise
D) WPA2-Enterprise
How can an HT radio increase throughput at the MAC sublayer of the Data-Link layer? A) RIFS B) A-MSDU C) MTBA D) A-MPDU E) All of the above
E) All of the above
If an attacker compromises a Pairwise Transient Key (PTK) in a WPA based network, they will be able to decrypt all of the traffic on that wireless network. A) True B) False
False
In WPA-PSK and WPA2-PSK, the Pairwise Transient Key (PTK) is a dynamic key that is per session / per client A) True B) False
True
WEP should never be used to secure a production wireless network that transmits sensitive data. A) True B) False
True
Data environments can typically handle a higher level of layer 2 retransmissions then VOIP networks. A) True B) False
true
If an attacker compromises the shared key in a WEP based network, they will be able to decrypt all of the traffic on that wireless network. A) True B) False
true
In WPA + EAP and WPA2 + EAP, the Pairwise Transient Key (PTK) is a dynamic key that is per session / per client A) True B) False
true
TKIP has been cracked A) True B) False
True
The "near / far" problem is normally addressed by the CSMA/CA process. A) True B) False
True
Several users are complaining that their VoWiFi phones keep losing connectivity. The WLAN administrator notices that the frame transmissions of the VoWiFi phones are corrupted when listened to with a protocol analyzer near the access point, but are not corrupted when listened to with the protocol analyzer near the VoWiFi phone. What is the most likely cause of this problem? A) Mismatched power settings B) Multipath C) Hidden node D) Adjacent cell interference E) RF interference
A) Mismatched power settings
Which HT mode requires that only HT radios are in use and that all HT clients have the same operational capabilities? Choose ONE A) Mode 0 - Greenfield Mode B) Mode 1 - HT nonmember protection mode C) Mode 3 - HT Mixed mode D) Mode 2 - HT 20 MHz protection mode
A) Mode 0 - Greenfield Mode
What are the benefits of using Dual-CTS protection in an HT basic service set? (Choose Two) A) Prevents interference with nearby 802.11a/b/g basic service sets B) Resolves hidden node problems C) Prevents intersymbol interference D) Improves throughput of HT devices
A) Prevents interference with nearby 802.11a/b/g basic service sets B) Resolves hidden node problems
Which encryption algorithm is used by the TKIP cipher suite? A) RC4 B) AES C) 3DES D) RSA
A) RC4
In a multiple channel architecture (MCA) design, what is the greatest number of nonoverlapping channels that can be deployed in the 2.4 GHz ISM band? (In the United States) A) 12 B) 3 C) 14 D) 11 E) 4
B) 3
Which cipher suites are available in WPA2? (Choose all that apply) A) TKIP-AES B) CCMP-RSA C) TKIP-RC4 D) CCMP-AES
C) TKIP-RC4 D) CCMP-AES
Which of the following is considered a DoS attack? (Choose One) A) Man-in-the-middle B) Peer-to-peer C) MAC spoofing D) Jamming
D) Jamming
Hiding the SSID provides good security for wireless networks. A) True B) False
false
In a WPA-PSK implementation, the pre-shared key is the same key used to encrypt and decrypt unicast traffic. A) True B) False
false
MAC Filtering is sufficient for securing most wireless networks. A) True B) False
false