5.11.6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following come in network monitoring or diagnostic activities can be used as a passive malicious attack?

Sniffing

Which of the following sends unsolicited business cards and messages to a Bluetooth device?

Bluejacking

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4Gz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless Phones are causing interference, which of the following wireless standards could the network be using?

802.11g Bluetooth

Which of the following best describes evil twin?

An access point that is configured to mimic a valid access point to teen logon credentials and other sensitive information

You're concerned that a wireless access point may be deployed with injured and sessions without authorization. What should you do?

Check the MAC address of the device is connected to your wired switch Conduct a site survey

Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?

Disable Bluetooth on the phone

You are implementing a wireless network in a dentist office. The dentists practice is small, so you choose to use any expensive consumer grade access point. While reading the documentation, do you notice that the access point support Wi-Fi protected set up (WPS) using a Pin. You're concerned about the security implications of this functionality. Next line why should you do to reduce risk?

Disable WPS in the access points configuration

Network packets nothing is often used to gain information necessary to contact more specific and detailed attacks. Which of the following is the best defense against packet sniffing?

Encryption

A user called to report that she is experiencing interment problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she's trying to access the wireless network from the conference room across the hall and next to the elevator. What is the most likely cause of her connectivity problem?

Interference is affecting the wireless signal

An attacker has hidden and NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and reader in the kiosk. She then uses that information to masquerade as the original end user devices and establish an NFC connection to the kiosk. What kind of attack has occurred in the scenario?

NFC relay attack

Which of the following locations contributes the greatest amount of interference for a wireless access point?

Near cordless phones Near back up generators

Spark jamming Random noise jamming Random pulse jamming

Repeatedly blasts receiving equipment with high-intensity, short-duration RF bursts at a rapid pace Produces RF signals using random amplitudes and frequencies Uses radio signal pulses of random amplitude and frequency

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue access point

Your organization uses an 802.11g Wireless network. Recently, other tenants installed the following equipment into yourbuilding: A wireless television distribution system running at 2.4 GHZ A wireless phone system running at 5.8 GHZ A wireless phone system running at 900 MHZ And 802.11n in wireless network running in the 5GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system

Which of the following best describes Bluesnarfing?

Viewing calendar, emails, and messages on a mobile device without authorization


Kaugnay na mga set ng pag-aaral

Real Estate Investment CE: Test #4

View Set

B-05 Define & Provide Examples of Schedules of Reinforcement - Part 1

View Set