8.2.7 Network Security
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
Bluejacking
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?
Rogue access point
Which type of RFID tag can send a signal over a long distance?
Active
Which of the following best describes an evil twin?
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
Listen to exam instructions You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)
Conduct a site survey and Check the MAC addresses of devices connected to your wired switch.
Which type of interference is caused by motors, heavy machinery, and fluorescent lights?
EMI
Which type of attack is WEP extremely vulnerable to?
IV attack
You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing?
Jamming
An attacker has intercepted near-field communication (NFC) data and is using that information to masquerade as the original device. Which type of attack is being executed?
Relay
Which of the following best describes Bluesnarfing?
Viewing calendar, emails, and messages on a mobile device without authorization