Chapter 7 Security+ Authorized Guide

Ace your homework & exams now with Quizwiz!

Which of the following is an unauthorized wireless router that allows access to a secure network? A. Rogue access point B. Evil twin C. Wardriving D. AP isolation

A rogue access point is an unauthorized wireless router (or WAP) that allows access to a secure network. An evil twin is a type of rogue AP, but it also uses the same SSID as the legitimate network. Wardriving is the act of trying to access a wireless network. AP isolation blocks each wireless user from communicating with each other.

What does isolation mode on an AP provide? A. Hides the SSID B. Segments each wireless user from every other wireless user C. Stops users from communicating with the AP D. Stops users from connecting to the Internet

AP isolation mode segments every wireless user so they can't communicate with each other. They can still communicate with the AP and access the Internet (or other network that the AP connects to). It does not hide the SSID.

What two security precautions can best help to protect against wireless network attacks? A. Authentication and the WEP B. Access control lists and WEP C. Identification and WPA2 D. Authentication and WPA

Authentication And WPA - The best two security precautions are authentication and WPA. Although WPA2 is more secure than WPA, the term identification is not correct. WEP is a deprecated wireless encryption protocol and should be avoided.

Which of the following is the unauthorized access of information from a Bluetooth device? A. Bluejacking B. Bluesnarfing C. Blue privileges D. The Blues Brothers

Bluesnarfing - It is the unauthorized access of information from a Bluetooth device, for example, calendar information, phonebook contacts, and so on. Bluejacking is the sending of unsolicited messages to Bluetooth-enabled devices. Blue privileges is not a valid answer, and if you answered the Blues Brothers, you should reread this entire chapter.

Of the following, what is the most common problem associated with UTP cable? A. Crosstalk B. Data emanation C. Chromatic dispersion D. Vampire tapping

CrossTalk - Of the listed answers, crosstalk is the most common problem associated with UTP cable. Older versions of UTP cable (for example, Category 3 or 5) are more susceptible to crosstalk than newer versions such as Cat 5e or Cat6. Although data emanation can be a problem with UTP cable, it is more common with coaxial cable, as is vampire tapping. Chromatic dispersion is a problem with fiber-optic cable.

What is the most commonly seen security risk of using coaxial cable? A. Data that emanates from the core of the cable B. Crosstalk between the different wires C. Chromatic dispersion D. Time domain reflection

Data That Emanates From The Core Of The Cable - Some types of coaxial cables suffer from the emanation of data from the core of the cable, which can be accessed. Crosstalk occurs on twisted-pair cable. Chromatic dispersion occurs on fiber-optic cable. Time domain reflection is a concept that is used by a TDR.

Your boss asks you to limit the wireless signal of a WAP from going outside the building. What should you do? A. Put the antenna on the exterior of the building B. Disable the SSID C. Enable MAC filtering D. Decrease the power levels of the WAP

Decrease the power levels of the WAP - To limit the wireless signal, decrease the power levels! This can easily be done in most WAP control panels. Putting the antenna on the exterior of the building would make it easier for wardrivers to access the network, and more difficult for actual users. Disabling the SSID has no effect on the signal level. Nor does MAC filtering, though both of those methods can increase the security of your wireless network.

You scan your network and find a rogue access point with the same SSID used by your network. What type of attack is occurring? A. Wardriving B. Bluesnarfing C. Evil twin D. IV attack

Evil Twin - An evil twin is a rogue access point that has the same SSID as another access point on the network. Wardriving is when a person attempts to access a wireless network, usually while driving in a vehicle. Bluesnarfing is the unauthorized access of information through a Bluetooth connection. An IV attack is one that attempts to break the encryption of wireless protocols.

What type of cabling is the most secure for networks? A. STP B. UTP C. Fiber-optic D. Coaxial

Fiber-Optic - Fiber-optic is the most secure because it cannot be tapped like the other three copper-based cables; it does not emit EMI. Although shielded twisted pair (STP) offers a level of security due to its shielding, it does not offer a level of security like to that of fiber-optic and is not the best answer.

Which of the following cable media is the least susceptible to a tap? A. Coaxial cable B. Twisted-pair cable C. Fiber-optic cable D. CATV cable

Fiber-optic cable - It is the least susceptible to a tap because it operates on the principle of light as opposed to electricity. All the other answers suffer from data emanation because they are all copper-based.

Which of the following cables suffers from chromatic dispersion if the cable is too long? A. Twisted-pair cable B. Fiber-optic cable C. Coaxial cable D. USB cables

Fiber-optic cable - It is the only one listed that might suffer from chromatic dispersion, because it is the only cable based on light. All the other answers are based on electricity.

What should you configure to improve wireless security? A. Enable the SSID B. IP spoofing C. Remove repeaters D. MAC filtering

MAC filtering - It disallows connections from any wireless clients unless the wireless client's MAC address is on the MAC filtering list.

Which of the following can be described as the act of exploiting a bug or flaw in software to gain access to resources that normally would be protected? A. Privilege escalation B. Chain of custody C. Default account D. Backdoor

Privilege escalation - It is as the act of exploiting a bug or flaw in software to gain access to resources that normally would be protected. Chain of custody is the chronological paper trail used as evidence. A default account is an account such as admin set up by the manufacturer on a device; it usually has a blank or simple password. A backdoor is used in computer programs to bypass normal authentication and other security mechanisms that might be in place.

Which of the following, when removed, can increase the security of a wireless access point? A. MAC filtering B. SSID C. WPA D. Firewall

SSID - By removing the security set identifier or SSID, the wireless access point will be more secure, and it will be tougher for wardrivers to access that network. Of course, no new clients can connect to the wireless access point (unless they do so manually). MAC filtering, WPA, and firewalls are all components that increase the security of a wireless access point.

Which of the following is the most secure type of cabling? A. Unshielded twisted pair B. Shielded twisted pair C. Coaxial D. Category five

Shielded twisted pair - It is the most secure type of cabling listed. It adds an aluminum sheath around the wires that can help mitigate data emanation. By far, fiber-optic would be the most secure type of cabling because it does not suffer from data emanation because the medium is glass instead of copper.

A wireless network switch has connectivity issues but only when the air-conditioning system is running. What can be added to fix the problem? A. Shielding B. A wireless network C. A key deflector D. Redundant air-conditioning systems

Shielding - By shielding the network switch, we hope to deflect any interference from the air conditioning system. Another option would be to move the network switch to another location.

In a wireless network, why is an SSID used? A. To secure the wireless access point B. To identify the network C. To encrypt data D. To enforce MAC filtering

To Identify The Network - The SSID is used to identify the wireless network. It does not secure the wireless access point; one of the ways to secure a wireless access point is by masking the word disabling the SSID. The SSID does not encrypt data or enforce MAC filtering.

Which of the following is the least secure type of wireless encryption? A. WEP 64-bit B. WEP 128-bit C. WPA with TKIP D. WPA2 with AES

WEP 64-bit - It is the least secure type of wireless encryption listed in the possible answers. The answers are listed in order from least secure to most secure.

Which of the following is the most secure protocol to use when accessing a wireless network? A. WEP B. WPA C. WPA2 D. WEP2

WPA2 - Wi-Fi Protected Access 2 (WPA2) is the most secure protocol listed for connecting to wireless networks. It is more secure than WPA and WEP. Wired Equivalent Privacy (WEP) is actually a deprecated protocol that should be avoided, as is WEP2. The WEP and WEP2 algorithms are considered deficient for encrypted wireless networks.


Related study sets

A level music, Vaughan Williams main features/ context/ wider listening

View Set

chapter 7: protein function - myoglobin and hemoglobin, muscle contraction, and antibodies

View Set

Chapter 3: Our Genes and Our Environment

View Set

Hematology laboratory testing- Automated/Manual

View Set

Geography Exam 3 Practice Questions

View Set

Which of the following statements are true of projectiles? List all that apply.

View Set