Section 6.13
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
Bluejacking
Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?
Sniffing
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)
802.11g & Bluetooth
Which of the following best describes an evil twin?
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)
Check the MAC addresses of devices connected to your wired switch. Conduct a site survey.
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?
Disable Bluetooth on the phone
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpensive, consumergrade access point. While reading the documentation, you notice that the access point supports WiFi Protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce the risk
Disable WPS in the access point's configuration.
Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?
Encryption
An attacker has hidden an NFC reader behind an NFCbased kiosk in an airport. The attacker uses the device to capture NFC data in transit between enduser devices and the reader in the kiosk. She then uses that information later on to masquerade as the original enduser device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario?
NFC relay attack
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
Rogue access point
Match the malicious interference type on the right with the appropriate characteristic on the left. Each characteristic can be used once, more than once, or not at all.
Spark jamming - Repeatedly blasts receiving equipment with highintensity, shortduration RF bursts at a rapid pace Random noise jamming - Produces RF signals using random amplitudes and frequencies Random pulse jamming - Uses radio signal pulses of random amplitude and frequency
Your organization uses an 802.11g wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11n wireless network running in the 5 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
The wireless TV system
Which of the following best describes Bluesnarfing?
Unauthorized viewing calendar, emails, and messages on a mobile device
Which of the following describes marks that attackers place outside a building to identify an open wireless network?
War chalking
The process of walking around an office building with an 802.11 signal detector known as what?
War driving