testout security pro 8.2.7 quiz practice
Which type of RFID tag can send a signal over a long distance?
Active
Which of the following best describes an evil twin?
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do?(select two. Each response is a complete solution.)
Check the MAC address of devices connected to your wire switch Conduct a site survey
Which type of interference is caused by motors, heavy machinery, and fluorescent lights?
EMI
Which type of attack is WEP extremely vulnerable to?
IV attack
You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issues, you have noticed short bursts of high-intesity RF signals are interfering with your wireless network's signal. which type of attack are you most likely experiencing.
Jamming
An attacker has interrupted near-field communication (NFC) data and is using that information to masquerade as the original device. Which type of attack is being executed?
Relay
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?
Rouge access point
Which of the following best describes BlueSnarfing
Viewing calendar, emails, and messages on a mobile device without authorization
Which of the following sends unsolicited business cards and messages to a Bluetooth device.
bluejacking