260mt08

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The primary design of a(n) _____ is to capture the transmissions from legitimate users. A - Bluetooth grabber B - rogue access point C - evil twin D - WEP

C - evil twin

What is a difference between NFC and RFID? A - RFID is faster than NFC. B - NFC is based on wireless technology while RFID is not. C - NFC devices cannot pair as quickly as RFID devices. D - RFID is designed for paper-based tags while NFC is not.

D - RFID is designed for paper-based tags while NFC is not.

AES-CCMP is the encryption protocol standard used in _____. A - WPA B - IEEE 802.11 C - NFC D - WPA2

D - WPA2

A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase? A - Controller AP B - Any type of AP can be managed by a WLC. C - Standalone AP D - Fat AP

A - Controller AP

Why is a rogue AP a security vulnerability? A - It allows an attacker to bypass network security configurations. B - It uses the weaker IEEE 80211i protocol. C - It requires the use of vulnerable wireless probes on all mobile devices. D - It conflicts with other network firewalls and can cause them to become disabled.

A - It allows an attacker to bypass network security configurations.

Which of these is NOT a risk when a home wireless router is not securely configured? A - Only a small percentage of the total traffic can be encrypted. B - An attacker can steal data from any folder with file sharing enabled. C - Malware can be injected into a computer connected to the WLAN. D - User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.

A - Only a small percentage of the total traffic can be encrypted.

Which technology is predominately used for contactless payment systems? A - near field communication (NFC) B - Bluetooth C - Radio Frequency ID (RFID) D - wireless local area network (WLAN)

A - near field communication (NFC)

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? A - EAP-TLS B - EAP-FAST C - EAP-SSL D - EAP-TTLS

B - EAP-FAST

Which of the following is NOT a wireless peripheral protection option? A - Switch to a more fully tested Bluetooth model B - Install a network sensor to detect an attack C - Update or replacing any vulnerable device D - Substitute a wired device

B - Install a network sensor to detect an attack

WPA replaces WEP with _____. A - Cyclic Redundancy Check (CRC) B - Temporal Key Integrity Protocol (TKIP) C - WPA2 D - Message Integrity Check (MIC)

B - Temporal Key Integrity Protocol (TKIP)

Which of these is NOT a limitation of turning off the SSID broadcast from an AP? A - Some versions of operating systems favor a network that broadcasts an SSID over one that does not. B - Users can more easily roam from one WLAN to another. C - The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP. D - Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.

B - Users can more easily roam from one WLAN to another.

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered? A - authenticated portal B - captive portal C - web-based portal D - rogue portal

B - captive portal

Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection? A - Bluecreeping B - Bluejacking C - Bluesnarfing D - Bluestealing

C - Bluesnarfing

Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP? A - It is a technology used by IEEE 802.11 for encryption B - It is a subset of WPA2 C - It is a framework for transporting authentication protocols D - It is the transport protocol used in TCP/IP for authentication

C - It is a framework for transporting authentication protocols

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? A - NFC method B - piconet method C - PIN method D - Push-Button method

C - PIN method

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? A - Frequency band B - Channel width C - RFID spectrum D - Channel selection

C - RFID spectrum

Which of these is NOT a type of wireless AP probe? A - AP probe B - dedicated probe C - WNIC probe D - wireless device probe

C - WNIC probe

Which of the following is NOT true of a wireless router? A - It combines multiple features into a single hardware device. B - It often includes features of an access point (AP). C - It is also called a "residential WLAN gateway". D - It is most commonly used in an enterprise setting .

D - It is most commonly used in an enterprise setting .

What is the primary weakness of wired equivalent privacy (WEP)? A - It functions only on specific brands of APs. B - It slows down a WLAN from 104 Mbps to 16 Mbps. C - Initialization vectors (IVs) are difficult for users to manage. D - Its usage creates a detectable pattern.

D - Its usage creates a detectable pattern.

Which of these is a vulnerability of MAC address filtering? A - Not all operating systems support MACs. B - The user must enter the MAC. C - APs use IP addresses instead of MACs. D - MAC addresses are initially exchanged unencrypted.

D - MAC addresses are initially exchanged unencrypted.


संबंधित स्टडी सेट्स

Emily English 复习-1 07/23/2021

View Set

Environmental Concerns of Industrialization

View Set

2023 Anthem Administrative Guidelines Exam

View Set

English Test 1-Phrases and Clauses #5

View Set

Chapter 16: Streams and Flooding

View Set

Ch. 9 Healthcare Marketing-Final Exam Prep

View Set