5.11.6
Which of the following come in network monitoring or diagnostic activities can be used as a passive malicious attack?
Sniffing
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
Bluejacking
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4Gz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless Phones are causing interference, which of the following wireless standards could the network be using?
802.11g Bluetooth
Which of the following best describes evil twin?
An access point that is configured to mimic a valid access point to teen logon credentials and other sensitive information
You're concerned that a wireless access point may be deployed with injured and sessions without authorization. What should you do?
Check the MAC address of the device is connected to your wired switch Conduct a site survey
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?
Disable Bluetooth on the phone
You are implementing a wireless network in a dentist office. The dentists practice is small, so you choose to use any expensive consumer grade access point. While reading the documentation, do you notice that the access point support Wi-Fi protected set up (WPS) using a Pin. You're concerned about the security implications of this functionality. Next line why should you do to reduce risk?
Disable WPS in the access points configuration
Network packets nothing is often used to gain information necessary to contact more specific and detailed attacks. Which of the following is the best defense against packet sniffing?
Encryption
A user called to report that she is experiencing interment problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she's trying to access the wireless network from the conference room across the hall and next to the elevator. What is the most likely cause of her connectivity problem?
Interference is affecting the wireless signal
An attacker has hidden and NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and reader in the kiosk. She then uses that information to masquerade as the original end user devices and establish an NFC connection to the kiosk. What kind of attack has occurred in the scenario?
NFC relay attack
Which of the following locations contributes the greatest amount of interference for a wireless access point?
Near cordless phones Near back up generators
Spark jamming Random noise jamming Random pulse jamming
Repeatedly blasts receiving equipment with high-intensity, short-duration RF bursts at a rapid pace Produces RF signals using random amplitudes and frequencies Uses radio signal pulses of random amplitude and frequency
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
Rogue access point
Your organization uses an 802.11g Wireless network. Recently, other tenants installed the following equipment into yourbuilding: A wireless television distribution system running at 2.4 GHZ A wireless phone system running at 5.8 GHZ A wireless phone system running at 900 MHZ And 802.11n in wireless network running in the 5GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
The wireless TV system
Which of the following best describes Bluesnarfing?
Viewing calendar, emails, and messages on a mobile device without authorization