HOD401 Chapter 15

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

5. Which of the following is designed to locate wireless access points? A. Site survey B. Traffic analysis C. Pattern recognition D. Cracking

a

10. A honeyspot is designed to do what? A. Look for patterns of known attacks. B. Look for deviations from known traffic patterns. C. Attract victims to connect to it. D. Analyze attacks patterns.

c

14. Bluejacking is a means of which of the following? A. Tracking a device B. Breaking into a device C. Sending unsolicited messages D. Crashing a device

c

16. Warchalking is used to do which of the following? A. Discover wireless networks. B. Hack wireless networks. C. Make others aware of a wireless network. D. Analyze a wireless network.

c

19. What is a PSK? A. The password for the network B. The certificate for the network C. A key entered into each client D. A distributed password for each user

c

9. Monitor mode is used by wireless cards to do what? A. Capture traffic from an associated wireless access point. B. Capture information from ad hoc networks. C. Capture information about wireless networks. D. Capture traffic from access points.

c

11. An SSID is used to do which of the following? A. Identify a network. B. Identify clients. C. Prioritize traffic. D. Mask a network.

a

12. AirPcap is used to do which of the following? A. Assist in the sniffing of wireless traffic. B. Allow network traffic to be analyzed. C. Allow the identification of wireless networks. D. Attack a victim.

a

13. What is a rogue access point? A. An access point not managed by a company B. An unmanaged access point C. A second access point D. A honeypot device

a

15. The wardriving process involves which of the following? A. Locating wireless networks B. Breaking into wireless networks C. Sniffing traffic D. Performing spectrum analysis

a

2. Which of the following operates at 5 GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11i

a

7. When a wireless client is attached to an access point, it is known as which of the following? A. Infrastructure B. Client-server C. Peer-to-peer D. Ad hoc

a

1. WEP is designed to offer security comparable to which of the following? A. Bluetooth B. Wired networks C. IrDA D. IPv6

b

17. A closed network is typically which of the following? A. Public network B. Private network C. Hot spot D. Kiosk location

b

18. Which feature makes WPA easy to defeat? A. AES encryption B. WPS support C. TKIP support D. RC4 support

b

8. Bluesnarfing is used to perform what type of attack? A. Send spam text messages. B. Read information from a device. C. Deposit malware on a system. D. Distribute files onto a system.

b

20. Which of the following is a device used to perform a DoS on a wireless network? A. WPA jammer B. WPA2 jammer C. WEP jammer D. Wi-Fi jammer

d

3. Which of the following specifies security standards for wireless? A. 802.11a B. 802.11b C. 802.11g D. 802.11i

d

4. Which of the following options shows the protocols in order from strongest to weakest? A. WPA, WEP, WPA2, Open B. WEP, WPA2, WPA, Open C. Open, WPA, WPA2, WEP D. WPA2, WPA, WEP, Open

d

6. What is a client-to-client wireless connection called? A. Infrastructure B. Client-server C. Peer-to-peer D. Ad hoc

d


Set pelajaran terkait

Chapter 6 Lesson 2: What is a Star?

View Set

Class Notes for Midterm and Final

View Set

Section 1: Evaluating Arguments and Evidence (Critical Thinking: Reason and Evidence - D265)

View Set

Leadership Exam 2 Practice Questions (chapters 1 and 11)

View Set

AP Stats Unit 8 Progress Check: MCQ Part B

View Set

Chapter 14: Nervous System Alterations

View Set

Marketing A343 Final Pearson Quizzes

View Set

Economics 202 Chapter 5 Market Equilibrium

View Set

Ch 9 Communication in The Digital Age

View Set

Management Chapter 1 Managers in the Workplace (study plan)

View Set