CS4451 Module 10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which one of the following standards provides some level of protection against the fact that there is implicit trust of management frames transmitted across the wireless network?

802.11w

You are setting up a wireless network for a small office. What type of AP are you most likely to install and why?

A residential WLAN gateway because it has a firewall, router, and DHCP server.

Which of the following represents true statements, similarities, or differences regarding WEP and WPA? Select two.

Although WPA addresses encryption and authentication, it is not considered a secure option. WPA fits into the existing WEP engine without the need for extensive hardware upgrades.

Sana takes public transportation to work. Every time Sana walks by a particular store she receives an image on her cell phone promoting a product the store is selling. This type of activity is akin to what type of attack?

Bluejacking

From a network security perspective, which of the following statements best describes the notion of hard edges and blurred edges?

Blurred edges have multiple entry points into the network. Hard edges are typically made up of two components.

Preety is trying to connect her Windows 11 laptop to the wireless router at a friend's house. After multiple attempts the connection is still not successful. Preety looks at the settings on the wireless router and makes a change. After implementing the change, the connection is successful. What change did Preety most likely make?

Changed the security protocol from WEP to WPA2

Your company claims they installed APs between 50 and 60 feet apart. However, as you walk around you notice what appears to be APs that are placed only 25 to 30 feet apart. Which of the following is likely to be the most logical explanation?

Dedicated probes have been installed between the APs.

A user starts monitoring network traffic because performance has suddenly degraded. They check the settings on their wireless router and notice an unauthorized device is connected. What change can the user make to help prevent this from happening again?

Disable the ability to generate PINs using WPS.

A company recently had a wireless breach due to an oversight, so they are focused on ensuring all employees, including members of the information technology (IT) department, are trained to the degree appropriate for their role. What major areas should be addressed? Select three.

Ensure protections are not overlooked. Ensure devices are properly configured. Emphasize the importance of security.

A consumer is using a wireless router that is three years old. They notice their Internet speed has been slowly degrading over the last week. Upon investigation, it is discovered their system was set up as a file server from which movies could be downloaded. Which of the following best represents an action that could have prevented this breach?

Ensured the router was secured and properly configured

A warehouse clerk uses a handheld barcode scanner to take inventory. Periodically, the clerk takes the scanner to a transfer station and downloads the data from the scanner using NFC technology. The scanner and transfer station connection use a pairing configuration so that one device can only transmit and the other can only receive. What is the benefit of this type of connection?

Mitigates MITM attacks

The authentication wireless protocols for wireless networks is known as the Extensible Authentication Protocol (EAP). Given this information, which of the following are true statements regarding EAP? Select two

PEAP is a more flexible EAP scheme because it creates an encrypted channel. EAP is a framework for transporting authentication protocols.

A builder is constructing an edifice for a company. The builder works with the company's networking team to design and install a wireless network. Which of the following represents considerations the networking team is most likely to factor into the design and implementation process? Select two.

Perform a site survey to ensure coverage is adequate. Minimize the wireless signal strength outside of the building.

A store selling athletic shoes tags their assets using RFID technology. A threat actor goes into a store and engages in a nefarious activity such that athletic shoes listed for $250 ring up at the cash register as only costing $50. What type of attack did the threat actor engage in?

RFID cloning

You are asked to implement MAC address filtering at a small company. Which of the following represents the way in which you are most likely to apply the requirement?

Specify MAC addresses that are allowed to connect.

A threat actor is planning on crafting multiple wireless frames with the intent of having the receiving stations store a value of 65536 (2 raised to the 16th power) in their NAV field. If successful, what will the effect be?

The attempt will be unsuccessful.

How does AES-CCMP help secure wireless networks? Select two.

The use of CCM with AES provides data privacy The CBC-MAC component of CCMP provides data integrity and authentication.

An attacker sits in a company lobby claiming he is waiting to meet someone who works there but arrived early. In the meantime, the attacker pulls out a laptop and, to his delight, can successfully intercept and read data from a wireless network. Which of the following best describes a potential vulnerability the attacker exploited? Select three.

The wireless network was open. Someone may have set up a rogue AP. The access point may have been misconfigured.

Jovanni opens an ice cream and pastry shop with internet access. As you enter the establishment, there is a sign that reads, "Wi-Fi Access with Automatic Encryption, no VPN Required." Which of the following best explains how Jovanni can justify posting such a sign?

The wireless router supports WPA3 with OWE.

A vocational high school IT security instructor suspects some learners are launching attacks during study hall to prevent others from successfully connecting to the wireless network. What are the suspected learners doing to prevent access?

They are spoofing certain types of management frames

A malicious actor is driving around various parking lots in an industrial complex searching for wireless signals. He notices one company uses the convention WAP-ABCD.EFGH where ABCD.EFGH vary to designate different wireless networks. The attacker also detects a wireless network called MyWiFi. What is the attacker most likely to think or do first? Select two.

Try to connect to the MyWiFi network. Think someone installed a rouge AP.

You are walking around a long, rectangular one-story building performing a site survey. You observe that too much of the wireless signal is leaking. Which of the following is most likely to mitigate the situation?

Turn the power level down a notch.

Tomi owned 34 percent of a business while Jeriko owned 66 percent in a partnership. They had a fallout because Jeriko was engaging in unethical practices. Unfortunately, Jeriko used a wireless connection from his cell phone to acquire business data from Tomi's phone before parting ways. Which of the following best describes this type of attack and/or how it could be prevented? Select two.

Turning off Bluetooth Bluesnarfing

Gazi is sitting at an airport terminal with his laptop. He connects to the wireless network and sends email messages to his contacts to provide updates on his vacation. Within a couple of days, his contacts are receiving a great deal of spam. Which of the following best describes how Gazi's system may have been compromised?

Gazi connected to an evil twin.

Which of the following represents weaknesses in the WEP security protocol? Select two.

It combines a 24-bit IV with the secret key to generate a random number. The code could be cracked in less than 7 hours if the router is using 802.11b.

If jamming is a successful wireless denial attack, why is it seldom used? Select two.

It requires expensive equipment. The source of the attack can easily be identified.

A company has adopted the use of the WPA2-Enterprise model for their wireless network. Which of the following accurately describes some of its characteristics? Select two.

It uses port-based authentication to grant access to clients. It strictly limits access to the authentication server.

The owner of a small bookkeeping office with two employees wants to control access to their wireless network. Which of the following, whether a best practice or not, are you most likely to implement to slightly deter malicious actors who are not well versed in breaching wireless networks? Select two.

MAC address filtering Disabling the SSID broadcast beacon

What are the risks associated with using the PIN printed on the sticker on some wireless routers (WRs)? Select two.

Using the PIN means an attacker can possibly crack it in four hours or less. If a threat actor gains physical access to the device, they will be able to connect.

Zara was hired as a wireless IoT (Internet of Things) engineer at a firm that is developing new products. They want to ensure wireless connections and transmissions to and from their IoT devices are secure. Which of the following hardware certification labels is their hardware most likely to comply with?

WPA3


संबंधित स्टडी सेट्स

MedSurg II Exam 1 (39, 40, 41, 42, 43, 44)

View Set

ACC211 Chapter 4 learning assignment

View Set

Introduction to Computer Concepts Final CHAPTER 12 STUDY SET

View Set

Mid term Intro to ECON (ECO 140-231) Summer class 2021

View Set