Chapter 15

Ace your homework & exams now with Quizwiz!

A closed network is typically which of the following? a. public network b. private network c. hot spot d. kiosk location

b. A closed network is typically considdred a private network and not meant for public use. The network is usually not visible, and you can locate and connect to it only if you already know the ssid.

Bluesnarfing is used to perform what type of attack? a. send spam text messages b. read information from a device c. deposit malware on a system d. distribute files onto a system

b. Bluesnarfing is used to read information from a Bluthooth-enabled device.

Which feature makes WPA easy to defeat? a. AES encryption b. WPS support c. TKIP support d. RC4 support

b. WPS uspport is a feature of WPA and later networks that allows push-button association of wireless clients to access points.

An SSID is used to do which of the following? a. identify a network b. identify clients c. prioritize traffic d. mask a network

a. ssid's server many functions, but the primary goal is to identify the network to clients or potentital clients. SSIDs are configurable by the owner of the network and should be changed from their defaults in every case.

Warchalking is used to do which of the following? a. discover wireless networks b. hack wireless networks c. make others aware of a wireless network d. analyze a wireless network

c. Warchalking is sued specifically to draw others attention to the presence of wireless network. The practice consists of drawing chalk symbols in the areas of a detected wireless network that indicates the name, channel and other information about the network.

Which of the following operates at 5 GHz? a. 802.11a b. 802.11b c. 802.11g d. 802.11i

a. 802.11a operates exclusively at the 5 GHz frequency range, whereas 802.11b and 802.11g operate at the 2.54GHz range. The newer 802.11n standard can operate at both frequency ranges.

What is a rogue access point? a. an access point not managed by a company b. an unmanaged access point c. a second access point d. a honeypot device

a. A rogue access point is one not managed by the organization and may be set up by an attacker or may even be set up by an employee trying to circumvent the rules.

Which of the following is designed to locate wireless access points? a. site survey b. traffic analysis c. pattern recognition d. cracking

a. The purpose of a site survey is to map out a site and locate access points and other wireless-enabled devices.

When a wireless client is attached to an access point, it is known as which of the following? a. infrastructure b. client-server c. peer-to-peer d. ad hoc

a. in an infrastructure network the client attaches directly to an access point instead of another client.

The wardriving process involves which of the following? a. locating wireless networks b. breaking into wireless networks c. sniffing traffic d. performing spectrum analysis

a. wardriving is used to locate wireless networks when using a mobile device as you are traveling around a city or neighborhood. Typically a GPS is also included to pinpoint networks.

WEP is designed to offer security comparable to which of the following? a. bluetooth b. wired networks c. irda d. ipv6

b. WEP is intended to offer security comparable to that experienced on traditional wired networks. In practice the security has been les than intended.

What is a PSK? a. the password for the network b. the certificate for the newwork c. a key entered into each client d. a distributed password for each user

c. A PSK is entered into each client that is going to access the wireless network. It is commonly found in WEP, WPA and WPA2 deployments. PSKs represent a security risk because they can be extracted from a compromised client and then allow a malicious party to access the network.

Bluejacking is a means of which of the following? a. tracking a device b. breaking into a device c . sending unsolicited messages d. crashing a device

c. Bluejacking is a means of sending unsolicited messages to a bluetooth-enabled device.

Monitor mode is used by wireless cards to do what? a. capture traffic from an associated wireless access point b. capture info from ad hoc networks c. capture info about wireless networks d. capture traffic from access points

c. Monitor mode is a feature supported by wireless network cards that allows the capturing of wireless traffic from unassociated wireless networks.

A honeyspot is designed to do what? a. look for patterns of known attacks b. look for deviations from known traffic patterns c. attract victims to connect to it d. analyze attack patterns

c. honeyspots are intended to attack victims to attach to it with the intention of gathering information.

Which of the following specifies security standards for wireless? a. 802.11a b. 802.11b c. 802.11g d. 802.11i

d. 802.11i specifies security standards for wireless and is not concerned with specifying new network standards for communication. WPA and WPA2 are designed to be compatible with this standard.

Which of the following options shows the protocols in order from strongest to weakest? a. WPA, WEP, WPA2, open b. WEP, WPA2, WPA, open c. Open, WPA, WPA2, WEP d. WPA2, WPA, WEP, open

d. WEP is by far the weakest of the protocols here; WPA is the next stronger, and WPA2 is the strongest of the group. Open implies little or no protection at all.

What is a client-to-client wireless connection called? a. infrastructure b. client-server c. peer-to-peer d. ad hoc

d. When two clients attach to each other in a wireless setting, it is known as an adhoc network.

Which of the following is a device used to perform a DoS on a wireless network? a. WPA jammer b. WPA2 jammer c. WEP jammer d. wi-fi jammer

d. a Wi-fi jammer can be used to shut down a wireless network while it is running.

AirPcap is used to do which of the following? a. assist in the sniffing of wireless traffic b. allow network traffic to be analyzed c. allow the identification of wireless networks d. attack a victim

A. AirPcap is a device desgined to allow in-depth analysis of traffic on wireless netowkrs. The device is typically used with software such as Wireshark.


Related study sets

ap human geography agriculture test

View Set

Chapter 15: An Age Of Industry/Inventors During The American Industrial Revolution

View Set

ESL Vocabulary B2: Wordlist (English Upper Intermediate)

View Set

Grade 12 IB Business Exam Review - Finance

View Set

History of the Philippine Agrarian Reform from Pre-Colonial Times - Benigno Aquino's Administration

View Set

Logical Reasoning Chapter 2: The Basics of Logical Reasoning

View Set

Chapter 3: Network Protocols and Communications

View Set