ETHICAL HACKING - CHAPTER 15 - MC QUESTIONS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is most associated with enterprise security access in a wireless network? A. WPA B. 802.1x C. WPA Radius D. TACACS+

B. 802.1x

A closed network is typically which of the following? A. Public network B. Private network C. Hot spot D. Kiosk location

B. Private network

An SSID is used to do which of the following? A. Identify a network. B. Identify clients. C. Prioritize traffic. D. Mask a network

A) Identify a network

Which of the following specifies security standards for wireless? A. 802.11a B. 802.11b C. 802.11g D. 802.11i

D) 802.11i

What is a client‐to‐client wireless connection called? A. Infrastructure B. Client‐server C. Peer‐to‐peer D. Ad hoc

D. Ad hoc

Which feature makes WPA easy to defeat? A. AES encryption B. WPS support (WiFi protected setup) C. TKIP support D. RC4 support

B. WPS support (WiFi protected setup)

WEP is designed to offer security comparable to which of the following? A. Bluetooth B. Wired networks C. IrDA D. IPv6

B. Wired networks

A honeyspot is designed to do what? A. Look for patterns of known attacks. B. Look for deviations from known traffic patterns. C. Attract victims to connect to it. D. Analyze attacks patterns.

C. Attract victims to connect to it.

Monitor mode is used by wireless cards to do what? A. Capture traffic from an associated wireless access point. B. Capture information from ad hoc networks. C. Capture information about wireless networks. D. Capture traffic from access points.

C. Capture information about wireless networks.

Warchalking is used to do which of the following? A. Discover wireless networks. B. Hack wireless networks. C. Make others aware of a wireless network. D. Analyze a wireless network.

C. Make others aware of a wireless network.

As a security administrator, you have security concerns regarding the plans to utilize wireless networks to bridge different corporate offices. Due to the location of these offices, traditional connections are cost prohibitive. Which of the following antennas will provide the best coverage while limiting the probability of unwanted signal interception? A. Omni B. Fan C. Yagi D. Satellite dish

C. Yagi

How many characters does a service set identifier (SSID) contain? A. 32 B. 64 C. 20 D. 128

A) 32

Which of the following operates at 5 GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11i

A) 802.11a

When a wireless client is attached to an access point, it is known as which of the following? A. Network Infrastructure B. Client‐server C. Peer‐to‐peer D. Ad hoc

A) Network Infrastructure

What is a rogue access point? A. An access point not managed by a company B. An unmanaged access point C. A second access point D. A honeypot device

A. An access point not managed by a company

AirPcap is used to do which of the following? A. Assist in the sniffing of wireless traffic. B. Allow network traffic to be analyzed. C. Allow the identification of wireless networks. D. Attack a victim.

A. Assist in the sniffing of wireless traffic.

The wardriving process involves which of the following? A. Locating wireless networks B. Breaking into wireless networks C. Sniffing traffic D. Performing spectrum analysis

A. Locating wireless networks

Which of the following is designed to locate wireless access points? A. Site survey B. Traffic analysis C. Pattern recognition D. Cracking

A. Site survey

Which of the following options shows the protocols in order from strongest to weakest? A. WPA, WEP, WPA2, Open B. WEP, WPA2, WPA, Open C. Open, WPA, WPA2, WEP D. WPA2, WPA, WEP, Open

D. WPA2, WPA, WEP, Open

Which of the following is a device used to perform a DoS on a wireless network? A. WPA jammer B. WPA2 jammer C. WEP jammer D. Wi‐Fi jammer

D. Wi‐Fi jammer


Ensembles d'études connexes

17:4 Providing First Aid for Shock

View Set

From Jesus to Christ Part I and 2

View Set

Formulas for Volume of Spheres and Cylinders

View Set

Quiz Chapter 23 Digestive System

View Set

Inquizitive Ch. 1 Western Civilization

View Set