Security Pro 8.2.7 Section Quiz
Which of the following sends unsolicited business cards and messages to a Bluetooth device? Slamming Bluebugging Bluesnarfing Bluejacking
Bluejacking
Which type of RFID tag can send a signal over a long distance? Passive NFC Active Bluetooth
Active
Which of the following best describes an evil twin? An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information. A threat agent that marks the outside of buildings to indicate the presence of a wireless network. A Bluetooth device that receives mobile phone commands via bluebugging. An access point that is added to a network by an internal employee to provide unauthorized network access.
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.) Conduct a site survey. Check the MAC addresses of devices connected to your wired switch. Implement an intrusion prevention system (IPS). Implement a network access control (NAC) solution. Implement an intrusion detection system (IDS).
Conduct a site survey. Check the MAC addresses of devices connected to your wired switch.
Which type of interference is caused by motors, heavy machinery, and fluorescent lights? EMI RFI RFID NFC
EMI
Which type of attack is WEP extremely vulnerable to? Bluesnarfing Cloning IV attack Evil twin
IV attack
You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing? Disassociation Jamming Cloning Bluesnarfing
Jamming
An attacker has intercepted near-field communication (NFC) data and is using that information to masquerade as the original device. Which type of attack is being executed? Bluesnarfing Relay Disassociation Cloning
Relay
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this? Social engineering Rogue access point Man-in-the-middle attack Physical security Phishing
Rogue access point
Which of the following best describes Bluesnarfing? Sending anonymous electronic business cards Cloning a mobile device Executing commands on a mobile device Viewing calendar, emails, and messages on a mobile device without authorization
Viewing calendar, emails, and messages on a mobile device without authorization