Wireless Network Security Chapter 8 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a difference between NFC and RFID? NFC is based on wireless technology while RFID is not. RFID is faster than NFC. NFC devices cannot pair as quickly as RFID devices. RFID is designed for paper-based tags while NFC is not.

RFID is designed for paper-based tags while NFC is not

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? Frequency band RFID spectrum Channel width Channel selection

RFID spectrum

Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection? Bluesnarfing Bluecreeping Bluestealing Bluejacking

Bluesnarfing

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? EAP-SSL EAP-TTLS EAP-FAST EAP-TLS

EAP-FAST

A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase? Fat AP Standalone AP Any type of AP can be managed by a WLC. Controller AP

Controller AP

Which of these is a vulnerability of MAC address filtering? Not all operating systems support MACs. The user must enter the MAC. MAC addresses are initially exchanged unencrypted. APs use IP addresses instead of MACs.

MAC addresses are initially exchanged unencrypted.

Which of the following is NOT a wireless peripheral protection option? Update or replacing any vulnerable device Switch to a more fully tested Bluetooth model Substitute a wired device Install a network sensor to detect an attack

Install a network sensor to detect an attack

Why is a rogue AP a security vulnerability? It uses the weaker IEEE 80211i protocol. It allows an attacker to bypass network security configurations. It conflicts with other network firewalls and can cause them to become disabled. It requires the use of vulnerable wireless probes on all mobile devices.

It allows an attacker to bypass network security configurations

Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP? It is a framework for transporting authentication protocols It is a technology used by IEEE 802.11 for encryption It is a subset of WPA2 It is the transport protocol used in TCP/IP for authentication

It is a framework for transporting authentication protocols

Which of the following is NOT true of a wireless router? It is also called a "residential WLAN gateway". It combines multiple features into a single hardware device. It is most commonly used in an enterprise setting . It often includes features of an access point (AP).

It is most commonly used in an enterprise setting .

What is the primary weakness of wired equivalent privacy (WEP)? Its usage creates a detectable pattern. Initialization vectors (IVs) are difficult for users to manage. It functions only on specific brands of APs. It slows down a WLAN from 104 Mbps to 16 Mbps.

Its usage creates a detectable pattern.

Which of these is NOT a risk when a home wireless router is not securely configured? Only a small percentage of the total traffic can be encrypted. Malware can be injected into a computer connected to the WLAN. User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. An attacker can steal data from any folder with file sharing enabled.

Only a small percentage of the total traffic can be encrypted

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? NFC method Push-Button method piconet method PIN method

PIN method

WPA replaces WEP with _____. Temporal Key Integrity Protocol (TKIP) Cyclic Redundancy Check (CRC) Message Integrity Check (MIC) WPA2

Temporal Key Integrity Protocol (TKIP)

Which of these is NOT a limitation of turning off the SSID broadcast from an AP? Some versions of operating systems favor a network that broadcasts an SSID over one that does not. Users can more easily roam from one WLAN to another. The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP. Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.

Users can more easily roam from one WLAN to another.

Which of these is NOT a type of wireless AP probe? wireless device probe AP probe WNIC probe dedicated probe

WNIC probe

AES-CCMP is the encryption protocol standard used in _____. IEEE 802.11 WPA NFC WPA2

WPA2

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered? authenticated portal captive portal rogue portal web-based portal

captive portal

The primary design of a(n) _____ is to capture the transmissions from legitimate users. Bluetooth grabber evil twin WEP rogue access point

evil twin

Which technology is predominately used for contactless payment systems? near field communication (NFC) Radio Frequency ID (RFID) wireless local area network (WLAN) Bluetooth

near field communication (NFC)


Ensembles d'études connexes

Airplane Systems (Magnetic Compass)

View Set

WebServices (Revature), Revature: Web Services, Servlets and DevOps, Web Services, Web Services

View Set

ch 6 - Topic D - 1.1 + 1.8 + 5.2

View Set

Pathophys Exam 2 Practice Questions

View Set

Adult/Family Health III Exam 1 Case Studies

View Set