Quiz: Module 11 Wireless Network Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? a. EAP-TLS b. EAP-FAST c. EAP-SSL d. EAP-TTLS

EAP-FAST This protocol securely tunnels any credential form for authentication (such as a password or a token) using TLS.

Which of the following is NOT a means by which a threat actor can perform a wireless denial of service attack? a. Disassociation b. Manipulate duration field values c. IEEE 802.iw separate d. Jamming

IEEE 802.iw separate This is fictitious and does not exist.

Which of these is a 24-bit value that changes each time a packet is encrypted and then is combined with a shared secret key? a. SL b. RC c. IV d. SSD

IV A shared secret key is combined with an initialization vector (IV), which is a 24-bit value that changes each time a packet is encrypted. The IV and the key are combined and used as a seed for generating a random number necessary in the encryption process.

Which WPA3 security feature is designed to increase security at the time of the handshake? a. MIT b. WEP c. SAE d. OWE

SAE WPA3 includes Simultaneous Authentication of Equals (SAE). SAE is designed to increase security at the time of the handshake when keys are being exchanged. The result is that WPA3 can give stronger security even if short or weak passwords are used.

Nyla is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be? a. Blueswiping b. Bluejacking c. Bluesnarfing d. Bluestealing

Bluesnarfing Bluesnarfing is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection. In a bluesnarfing attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner's knowledge or permission.

Which of these is the encryption protocol for WPA2? a. CPB b. CBD-MAC c. CCMP d. CMAC-RSTS

CCMP The encryption protocol used for WPA2 is the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and specifies the use of CCM (a general-purpose cipher mode algorithm providing data privacy) with AES.

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered? a. Control portal b. Rogue portal c. Captive portal d. Authenticated portal

Captive portal A captive portal AP uses a standard web browser to provide information and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security.

Imani has been asked to purchase wireless LAN controllers (WLCs) for the office. What type of APs must she also purchase that can be managed by a WLC? a. Controller AP b. Standalone AP c. Any type of AP can be managed by a WLC d. Fat AP

Controller AP Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is the single device that can be configured, and then these settings are automatically distributed to all controller APs (a remote office WLAN controller is used to manage multiple WLCs at remote sites from a central location).

Zariah is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is Zariah describing? a. Bluetooth grabber b. Rogue access point c. WEP-II d. Evil twin

Evil twin An evil twin is an AP that is set up by an attacker. This AP is designed to mimic an authorized AP, so a user's mobile device like a laptop or tablet will unknowingly connect to this evil twin instead. Attackers can then capture the transmissions from users to the evil twin AP.

Fatima has just learned that employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability? a. It allows an attacker to bypass network security configurations. b. It requires the use of vulnerable wireless probes on all mobile devices. c. It conflicts with other network firewalls and can cause them to become disabled. d. It uses the weaker IEEE 80211i protocol.

It allows an attacker to bypass network security configurations. A rogue AP is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. For example, although firewalls are typically used to restrict specific attacks from entering a network, an attacker who can access the network through a rogue AP is behind the firewall.

Maryam is explaining the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP? a. It is a subset of WPA2. b. It is the transport protocol used in TCP/IP for authentication. c. It is a technology used by IEEE 802.11 for encryption. d. It is a framework for transporting authentication protocols.

It is a framework for transporting authentication protocols. A framework for transporting the authentication protocols is known as the Extensible Authentication Protocol (EAP). Despite its name, EAP is a framework for transporting authentication protocols instead of the authentication protocol itself. EAP essentially defines the format of the messages and uses four types of packets: request, response, success, and failure.

Which of these is a vulnerability of MAC address filtering in a WLAN? a. The user must enter the MAC. b. APs use IP addresses instead of MACs. c. MAC addresses are initially exchanged unencrypted. d. Not all operating systems support MACs.

MAC addresses are initially exchanged unencrypted. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. Attackers monitoring the airwaves could easily see the MAC address of an approved device and then substitute it on their own device.

Aaliyah has been asked to do research in a new payment system for the retail stores that her company owns. Which technology is predominately used for contactless payment systems that she will investigate? a. Bluetooth b. Wi-Fi c. Near field communication (NFC) d. Radio frequency ID (RFID)

Near field communication (NFC) Consumer NFC devices are most often used as an alternative to using cash or a credit card as a payment method and are called contactless payment systems. Users store payment card numbers in a "virtual wallet" on a watch or smartphone to pay for purchases at an NFC-enabled PoS checkout device.

Which of these does not require authentication? a. Open method b. Initialization method c. PSK d. Enterprise method

Open method A wireless network in which no authentication is required, such as at a local coffee shop, is using an open method.

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? a. Piconet method b. PIN method c. Push-button method d. Click-to-connect method

PIN method There are significant design and implementation flaws in WPS using the PIN method.

What is a difference between NFC and RFID? a. NFC devices cannot pair as quickly as RFID devices. b. RFID is designed for paper-based tags while NFC is not. c. RFID is faster than NFC. d. NFC is based on wireless technology while RFID is not.

RFID is designed for paper-based tags while NFC is not. RFID is commonly used to transmit information between employee identification badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader. For example, an RFID tag can easily be affixed to the inside of an ID badge and can be read by an RFID reader as the user walks through the turnstile with the badge in a pocket.

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? a. RFID spectrum b. Channel width c. Channel selection d. Frequency band

RFID spectrum RFIDs do not have APs, but rather they are found on Wi-Fi networks.

Which of these is NOT a type of wireless AP probe? a. Dedicated probe b. AP probe c. Wireless device probe d. WNIC probe

WNIC probe This is fictitious and does not exist.

Which technical specification of the Wi-Fi Alliance is the same as ad hoc mode in a Wi-Fi network? a. Ad hoc II b. Wi-Fi Direct c. Dynamic ad hoc d. Alliance IBSS

Wi-Fi Direct A WLAN using an AP is operating in infrastructure mode. The IEEE specifications also define networks that are not using an AP. This is called an Independent Basic Service Set (IBSS) or, more commonly, ad hoc mode. In ad hoc mode, devices can only communicate between themselves and cannot connect to another network. The Wi-Fi Alliance has also created a similar technical specification called Wi-Fi Direct.

Which of these is NOT a risk when a home wireless router is not securely configured? a. Malware can be injected into a computer connected to the WLAN. b. Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. c. Wireless endpoints must be manually approved to connect to the WLAN. d. An attacker can steal data from any folder with file sharing enabled.

Wireless endpoints must be manually approved to connect to the WLAN. When a wireless router is not securely configured, it does not require that endpoints be manually approved to connect to the network.


Ensembles d'études connexes

Music History Middle Ages and Renaissance

View Set

Kaplan Pediatrics Review Questions

View Set

Chapter 16-28 - give me liberty all study questions/chronological for Final

View Set

Business Chapter 14 - Limited Liability Business Forms

View Set

Money and Banking Test 2 Questions

View Set

Part Three-- Identifying Accounting Concepts and practices

View Set