Testout 5.10-5.12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following specifications identify security that can be added to wireless networks?

- 802.11i - 80.1x

WiMAX is an implementation of which IEEE committee?

- 802.16

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? select two

- 802.1x - AES encryption

which of the following are typically used for encrypting data on a wireless network?

- TKIP - AES

you are troubleshooting a wireless connectivity issue in a small office.

- bluetooth - 802.11g

you are concerned that wireless access points may have been deployed within your organization without authorization.

- check the MAC addresses of devices connected to your wired switch - conduct a site survey

You need to implement a wireless network between two buildings on a college campus. A wired network has already been implemented within each building. the buildings are 100 meters apart. select two

- high gain - parabolic

a user calls to report that she is experiencing intermittent problems

- inference is affecting the wireless signal

which of the following locations contributes to the greatest amount of interference for a wireless access point?

- near backup generators - near cordless phones

your organization uses an 802.11g wireless network.

- the wireless tv system

you have a small wireless network that uses multiple access points.

- tkip encryption - preshared key

which of the following are true about WPA2?

- upgrading from a network using WEP typically requires installing new hardware - WPA2 uses AES for encryption and CBC-MAC for data integrity

Evil Twin

An access point (AP) set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead of the authorized AP.

you are implementing a wireless network in a dentist's office, what should you do to reduce this risk?

Disable WPS in the access point's config

an attacker has hidden an NFC reader behind a NFC-based kiosk in an airport

NFC relay attack

which of the following is used on a wireless network to identify the network name?

SSID

What encryption method is used by WPA for wireless networks?

TKIP

which of the following is the weakest form of encryption for an 802.11 wireless network?

WEP

which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

which sends unsolicited business cards and messages to a Bluetooth device

bluejacking

you need to configure a wireless network card to connect to your network at work. The connection should use a username and password for authentication with AES encryption. What should you do?

configure the connection to use WPA2-Enterprise

you want to connect a laptop computer running windows to a wireless network. the wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do?

configure the connection with a pre-shared key and AES encryption

which of the following is the best protection to prevent attacks on mobile phones through bluetooth protocol?

disable bluetooth on the phone

Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?

encryption

which of the following features are supplied by WPA2 on a wireless network?

encryption

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

rogue access point

which of the following common network monitoring/diagnostic activities can be used as a passive malicious attack?

sniffing

Bluesnarfing

viewing calendar, emails, and messages on a mobile device without authorization


Ensembles d'études connexes

CCNA 2 Practice Final (as of May 2021)

View Set

Spanish Influence at Home and Abroad

View Set

Asexual and Sexual Reproduction Flash Cards

View Set

Lifespan Developmental Psych Chapter 16

View Set

Chapter 6.2 U.S. History Vocabulary

View Set

SAUNDERS HESI STUDY for PHARM - Endocrine Meds

View Set

GACE: Major British Authors & Summary of Works

View Set

AP US History Chapters 26, 27, and 28

View Set