ch. 11

Ace your homework & exams now with Quizwiz!

Which of these is the encryption protocol for WPA2?

CMAC-RSTS CPB CBD-MAC CCMP

Which of these is NOT a type of wireless AP probe?

Wireless device probe WNIC probe Dedicated probe AP probe

Which technical specification of the Wi-Fi Alliance is the same as ad hoc mode in a Wi-Fi network?

Ad hoc II Dynamic ad hoc Alliance IBSS Wi-Fi Direct

Which of the following is NOT a means by which a threat actor can perform a wireless denial of service attack?

Jamming Disassociation IEEE 802.iw separate Manipulate duration field values

Which of these is NOT a risk when a home wireless router is not securely configured?

An attacker can steal data from any folder with file sharing enabled. Wireless endpoints must be manually approved to connect to the WLAN. Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. Malware can be injected into a computer connected to the WLAN.

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered?

Authenticated portal Captive portal Control portal Rogue portal

Nyla is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?

Blueswiping Bluesnarfing Bluejacking Bluestealing

Aaliyah has been asked to do research in a new payment system for the retail stores that her company owns. Which technology is predominately used for contactless payment systems that she will investigate?

Bluetooth Near field communication (NFC) Wi-Fi Radio frequency ID (RFID)

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?

EAP-FAST EAP-TLS EAP-TTLS EAP-SSL

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?

Frequency band Channel selection RFID spectrum Channel width

Maryam is explaining the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?

It is the transport protocol used in TCP/IP for authentication. It is a framework for transporting authentication protocols. It is a subset of WPA2. It is a technology used by IEEE 802.11 for encryption.

Fatima has just learned that employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability?

It uses the weaker IEEE 80211i protocol. It allows an attacker to bypass network security configurations. It conflicts with other network firewalls and can cause them to become disabled. It requires the use of vulnerable wireless probes on all mobile devices.

What is a difference between NFC and RFID?

NFC is based on wireless technology while RFID is not. RFID is faster than NFC) RFID is designed for paper-based tags while NFC is not. NFC devices cannot pair as quickly as RFID devices.

Which of these is a vulnerability of MAC address filtering in a WLAN?

Not all operating systems support MACs. APs use IP addresses instead of MACs. The user must enter the MAC. MAC addresses are initially exchanged unencrypted.

Which of these does not require authentication?

Open method PSK Enterprise method Initialization method

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

Push-button method Piconet method PIN method Click-to-connect method

Which of these is a 24-bit value that changes each time a packet is encrypted and then is combined with a shared secret key?

RC IV SL SSD

Zariah is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is Zariah describing?

Rogue access point Bluetooth grabber WEP-II Correct! Evil twin

Imani has been asked to purchase wireless LAN controllers (WLCs) for the office. What type of APs must she also purchase that can be managed by a WLC?

Standalone AP Controller AP Fat AP Any type of AP can be managed by a WLC

Which WPA3 security feature is designed to increase security at the time of the handshake?

WEP MIT OWE SAE


Related study sets

Chapter 13 Power, Politics, Conflict, and Negotiation

View Set

JLPT 漢字マスター N1 生活 ภาษาไทย 23/30 by marc.narmthep

View Set

Chapter 26, Assessment of High-Risk Pregnancy

View Set

TEFL Online Training Unit 3: Planning

View Set

Cellular Respiration, THE MITOCHONDRIA IS THE POWERHOUSE OF THE CELL

View Set

OB EAQ's Chapter 10, 11, 12, 13, 14, 15, 16, 17

View Set

Chapter 13: Group Interventions - PrepU

View Set