CompTIA Security+ Exam SY0-501 Wireless Security Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

TKIP (Temporal Key Integrity Protocol)

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:

IV Attack (Initialization Vector)

A type of wireless attack designed to exploit vulnerabilities of WEP is known as:

denial-of-service (DoS) attack

A wireless disassociation attack is a type of

Denial of Service (Dos) attack

A wireless jamming attack is a type of:

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

AES-based encryption mode implemented in WPA2 is known as:

What is a IV Attack?

An initialization vector (IV) attack is an attack on wireless networks. It modifies the IV of an encrypted wireless packet during transmission. Once an attacker learns the plaintext of one packet, the attacker can compute the RC4 key stream generated by the IV used.

EAP (Extensible Authentication Protocol)

Extensible Authentication Protocol (EAP) is a authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework.

Bluesnarfing

Gaining unauthorized access to a Bluetooth device is referred to as:

NFC (Near Field Communication)

What is the name of a technology used for con-tactless payment transactions?

EAP-TLS (EAP-Transport Layer Security)

Which of the EAP methods listed below relies on client-side and server-side certificates to perform authentication?

WPA2 CCMP

Which of the following security protocols is the least susceptible to wireless replay attacks?

RFID (radio frequency identification)

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

WPA2-PSK

Which of the following would be the best solution for securing a small network lacking an authentication server?

WPS (Wi-Fi Protected Setup) WEP (Wireless equivalent Privacy)

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)

Suitable for large corporate networks and Requires Radius

Bluejacking

The practice of sending unsolicited messages over Bluetooth is called:

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three

○ RADIUS (Remote Authentication Dial-in User Service)

§ One of the more common AAA protocols □ Supported on a wide variety of platforms and devices □ Not just for dial-in § Centralize authentication for users □ Routers, switches, firewalls □ Server authentication □ Remote VPN access □ 802.1X network access


Set pelajaran terkait

Comparative Government Chapter 5-11

View Set

>>>Muscles - Origin, Insertion, Action

View Set

Human Resource Management exam 1

View Set

Med Surge PrepU Ch.10 Fluid & Electrolytes

View Set

Anatomy: Bone and Skeletal Tissue Vocabulary Chp. 6

View Set

Medsurg 2 Final Exam (New Topics)

View Set

Saunders Nclex Questions - Cardiac

View Set

CP+ : Ch. 19 - Care of the School-Age Child

View Set