6.10 Wireless Attacks
Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?
Encryption
The process of walking around an office building with an 802.11 signal detector is known as what?
War Driving
Which of the following describes marks that attackers place outside a building to identify an open wireless network?
War chalking
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
Bluejacking
Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?
Sniffing
Which of the following best describes an evil twin?
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?(Select two)
Bluetooth AND 802.11b
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?
Disable Bluetooth on the phone
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?
Interference is affecting the wireless signal.
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
Rogue Access Point
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building:....since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
The wireless TV system
Which of the following best describes Bluesnarfing?
Unauthorized viewing calendar, emails, and messages on a mobile device