260mt08
The primary design of a(n) _____ is to capture the transmissions from legitimate users. A - Bluetooth grabber B - rogue access point C - evil twin D - WEP
C - evil twin
What is a difference between NFC and RFID? A - RFID is faster than NFC. B - NFC is based on wireless technology while RFID is not. C - NFC devices cannot pair as quickly as RFID devices. D - RFID is designed for paper-based tags while NFC is not.
D - RFID is designed for paper-based tags while NFC is not.
AES-CCMP is the encryption protocol standard used in _____. A - WPA B - IEEE 802.11 C - NFC D - WPA2
D - WPA2
A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase? A - Controller AP B - Any type of AP can be managed by a WLC. C - Standalone AP D - Fat AP
A - Controller AP
Why is a rogue AP a security vulnerability? A - It allows an attacker to bypass network security configurations. B - It uses the weaker IEEE 80211i protocol. C - It requires the use of vulnerable wireless probes on all mobile devices. D - It conflicts with other network firewalls and can cause them to become disabled.
A - It allows an attacker to bypass network security configurations.
Which of these is NOT a risk when a home wireless router is not securely configured? A - Only a small percentage of the total traffic can be encrypted. B - An attacker can steal data from any folder with file sharing enabled. C - Malware can be injected into a computer connected to the WLAN. D - User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.
A - Only a small percentage of the total traffic can be encrypted.
Which technology is predominately used for contactless payment systems? A - near field communication (NFC) B - Bluetooth C - Radio Frequency ID (RFID) D - wireless local area network (WLAN)
A - near field communication (NFC)
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? A - EAP-TLS B - EAP-FAST C - EAP-SSL D - EAP-TTLS
B - EAP-FAST
Which of the following is NOT a wireless peripheral protection option? A - Switch to a more fully tested Bluetooth model B - Install a network sensor to detect an attack C - Update or replacing any vulnerable device D - Substitute a wired device
B - Install a network sensor to detect an attack
WPA replaces WEP with _____. A - Cyclic Redundancy Check (CRC) B - Temporal Key Integrity Protocol (TKIP) C - WPA2 D - Message Integrity Check (MIC)
B - Temporal Key Integrity Protocol (TKIP)
Which of these is NOT a limitation of turning off the SSID broadcast from an AP? A - Some versions of operating systems favor a network that broadcasts an SSID over one that does not. B - Users can more easily roam from one WLAN to another. C - The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP. D - Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.
B - Users can more easily roam from one WLAN to another.
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered? A - authenticated portal B - captive portal C - web-based portal D - rogue portal
B - captive portal
Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection? A - Bluecreeping B - Bluejacking C - Bluesnarfing D - Bluestealing
C - Bluesnarfing
Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP? A - It is a technology used by IEEE 802.11 for encryption B - It is a subset of WPA2 C - It is a framework for transporting authentication protocols D - It is the transport protocol used in TCP/IP for authentication
C - It is a framework for transporting authentication protocols
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? A - NFC method B - piconet method C - PIN method D - Push-Button method
C - PIN method
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? A - Frequency band B - Channel width C - RFID spectrum D - Channel selection
C - RFID spectrum
Which of these is NOT a type of wireless AP probe? A - AP probe B - dedicated probe C - WNIC probe D - wireless device probe
C - WNIC probe
Which of the following is NOT true of a wireless router? A - It combines multiple features into a single hardware device. B - It often includes features of an access point (AP). C - It is also called a "residential WLAN gateway". D - It is most commonly used in an enterprise setting .
D - It is most commonly used in an enterprise setting .
What is the primary weakness of wired equivalent privacy (WEP)? A - It functions only on specific brands of APs. B - It slows down a WLAN from 104 Mbps to 16 Mbps. C - Initialization vectors (IVs) are difficult for users to manage. D - Its usage creates a detectable pattern.
D - Its usage creates a detectable pattern.
Which of these is a vulnerability of MAC address filtering? A - Not all operating systems support MACs. B - The user must enter the MAC. C - APs use IP addresses instead of MACs. D - MAC addresses are initially exchanged unencrypted.
D - MAC addresses are initially exchanged unencrypted.