Security+ Network Security Fundamentals Chapter 9 and Chapter 10
Captive portal access point
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?
Wired Equivalent Privacy (WEP)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.
rogue
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
Bluesnarfing
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
False
An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP, with the intent to redirect client devices.
False
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
True
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
supplicant
If the EAP authentication is successful, a success packet is sent to the ____________________.
Google Glass
Select below the option that represents a wearable technology:
EAP-FAST
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:
Location services
Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.
True
Simply using a mobile device in a public area can be considered a risk.
Active slave
Slave devices that are connected to a piconet and are sending transmissions are known as what?
iOS
The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
False
The CardBus is a 64-bit bus in the PC card form factor.
False
The Google Android mobile operating system is a proprietary system, for use on only approved devices.
Bluetooth v1.2
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?
ExpressCard
The PC Card and CardBus devices are being replaced by what technology?
48 bits
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?
Type I
What PC Card type is typically used for memory?
Secure Digital Input Output (SDIO)
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?
Access Point
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
32
What is the maximum number of characters that can exist within an SSID name?
33 ft
What is the maximum range of most Bluetooth devices?
LEAP
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?
Bluejacking
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
evil twin
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
Mobile Device Management (MDM)
What type of management system below can help facilitate asset tracking?
scanning
When a wireless device looks for beacon frames it is known as ____________________.
13
When using AES-CCMP, the AES-256 bit key requires how many rounds?
PEAP
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?
AES-CCMP
Which encryption protocol below is used in the WPA2 standard?
Error
Which of the following choices is not one of the four types of packets used by EAP?
authenticator
Which option below is responsible for the issuing of EAP request packets?
Enable a lock screen
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
iOS
What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?
Personal digital assistant (PDA)
What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?
Inventory control
What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?
Track stolen devices
Which of the following selections is not one of the features provided by a typical MDM?
False
Bluetooth devices are not backward compatible with previous versions.
Personal Area Network
Bluetooth is an example of what type of technology below?
Initialization vector (IV)
A 24-bit value used in WEP that changes each time a packet is encrypted.
Bluesnarfing
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?
True
A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.
A video
A QR code can't contain which of the following items directly?
Quick Response (QR) code
A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.
Lock screen
A technology that prevents a mobile device from being used until the user enters the correct passcode.
True
APs use antennas that radiate a signal in all directions.
Geo-tagging
Adding or allowing geographical identification data in a mobile app
1234
What PIN is considered to be the most commonly used PIN?
False
Mobile devices such as laptops are stolen on average once every 20 seconds.
flash memory
Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.
Location services
Mobile devices with global positioning system (GPS) abilities typically make use of:
parked
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
scatternet
Piconets in which connections exist between different piconets are known as a:
Off-boarding
The ability to quickly remove devices from the organization's network
On-boarding
The ability to rapidly enroll new mobile devices.
Remote wiping
The ability to remote erase sensitive data stored on a mobile device
Preshared key (PSK)
The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
Wi-Fi Protected Access 2 (WPA 2)
The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.
Mobile application management (MAM)
The tools and services responsible for distributing and controlling access to apps.
Geo-fencing
Using a mobile device's GPS to define geographical boundaries where an app can be used.
Tablets
_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.
Geo-fencing
_________________ uses a device's GPS to define geographical boundaries where an app can be used.
Bluetooth
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Web-based
Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:
site survey
A __________________ is an in-depth examination and analysis of a wireless LAN site.
RS232
A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?
Near field communication (NFC)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
Secure digital (SD)
A small form factor storage media of a variety of different types and sizes.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enabled devices
Wi-Fi Protected Setup (WPS)
An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.
Subnotebook
An ultrabook is an example of what type of a portable computer?
Mobile Application Management
How can an administrator manage applications on mobile devices using a technique called "app wrapping?"
RF Jamming
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occuring.
Asset tracking
Maintaining an accurate record of company-owned mobile devices
Credential management
Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:
War driving
Searching for wireless signals from an automobile or on foot using a portable computing device
Removable media storage
Select below the item that is not considered to be a basic characteristic of mobile devices:
Extreme Capacity (SDXC) These are: High capacity (SDHC) Standard capacity (SDSC) Secure Digital Input Output (SDIO)
Select below the option that is not one of the SD format card families: