Security Awareness - Unit 10 Quiz
What is Bluetooth's rate of transmission? 1 Mbps 3 Mbps 2 Kbps 4 Kbps
1 Mbps
What serves as the network name identifier in a Wi-Fi network? MAC address WPS Pin number SSID WPA2 ID
SSID
Which of the following is an optional means of configuring WPA2 Personal security using a PIN? batch configuration security scripts SSID broadcast Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS)
What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable? encryption private SSID lock screen ad hoc network
encryption
An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called? ad hoc network guest network evil twin VPN
evil twin
What is it called if a user disables the built-in limitations on their Apple iOS device to provide additional functionality? root logon ROM swapping jailbreaking remote lockout
jailbreaking
What security feature on a smartphone prevents the device from being used until a passcode is entered? lock screen encryption tracking remote wipe
lock screen
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen? encryption remote wipe tracking lock screen
remote wipe
Which mobile device setting regulates when the device goes into hibernation mode? lock screen sleep time auto-locate root timeout
sleep time
What is the most secure option for the type of passcode that can be entered to access a mobile device? short PIN strong alphanumeric password swipe pattern user name
strong alphanumeric password
What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network? ad hoc network free access network virtual private network secure access network
virtual private network
From what term is war driving derived? chalk walking war dialing war walking walk dialing
war dialing
Which of the following is an attack that sends unsolicited messages to Bluetooth-enabled devices? Bluesurfing Bluejacking Bluesnarfing Bluephishing
Bluejacking
Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers? Bluephising Bluesurfing Bluesnarfing Bluejacking
Bluesnarfing
Whereas tablets are designed for performance, laptops are focused on ease of use. True False
False
Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers. True False
False
In the field of computer networking and wireless communications, what is the most widely known and influential organization? IEEE IETF W3C ACM
IEEE
Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage. True False
True
Most Bluetooth devices have a range of only about 10 meters. True False
True
Unless remote management is essential, it is recommended that this feature be disabled with a wireless router. True False
True
