6.10 Wireless Attacks

Ace your homework & exams now with Quizwiz!

Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?

Encryption

The process of walking around an office building with an 802.11 signal detector is known as what?

War Driving

Which of the following describes marks that attackers place outside a building to identify an open wireless network?

War chalking

Which of the following sends unsolicited business cards and messages to a Bluetooth device?

Bluejacking

Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?

Sniffing

Which of the following best describes an evil twin?

An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?(Select two)

Bluetooth AND 802.11b

Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?

Disable Bluetooth on the phone

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?

Interference is affecting the wireless signal.

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue Access Point

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building:....since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system

Which of the following best describes Bluesnarfing?

Unauthorized viewing calendar, emails, and messages on a mobile device


Related study sets

FINC 409 - Chapter 11 Practice Problems

View Set

Chapter 22: Complications Occurring During Labor and Delivery

View Set

Chapter Thirteen Practice Questions

View Set

Chapter 8 Quiz - Management Information Systems

View Set

Chapter 9: Controlling and other costs

View Set