CTC 395 Finals

Ace your homework & exams now with Quizwiz!

WLANs are based on de jure standards. True/False

True

Which technology can use a pad reader to get product code dates and other information? a. RFID b. Bluetooth c. WiMax d. GSM

a. RFID

What is a disadvantage of narrowband transmissions? a. interference from another radio signal b. not well regulated c. requires a complicated algorithm d. expensive to implement

a. interference from another radio signal

Which encryption protocol is used for 802.11i/WPA2? a. PSK b. CCMP c. RSN d. TKIP

b. CCMP

The radio frequency spectrum is divided into over 450 different sections or ____. bands amplitudes wavelengths heights

bands

Which sublayer of the Physical layer reformats data received from the MAC layer when transmitting? a. Data Link b. PMD c. PLCP d. LLC

c. PLCP

Which of the following units is used to measure frequency? a. decibel b. byte c. volt d. hertz

d. hertz

Power of an electromagnetic signal such as one used in WLANs is measured by which unit? a. milliwatts b. millivolts c. milliamps d. milliohms

a. milliwatts

It is important that the entire RF spectrum be scanned for potential attacks, which means the channels on which frequencies should be scanned? a. 2.4 MHz, 3.5 MHz b. 2.4 GHz, 5 GHz c. 11 MHz, 54 MHz d. 11 GHz, 54 GHz

b. 2.4 GHz, 5 GHz

Which type of modulation changes the starting point of the cycle to represent a change from a 1 bit to a 0 bit and vice versa? a. FM b. PM c. DM d. AM

b. PM (Phase modulation)

Which of the following is an organization's internal infrastructure connection between two or more remote locations? a. wireless ISP b. backhaul connection c. last mile connection d. long term evolution

b. backhaul connection

Which binary modulation technique is similar to frequency modulation? a. amplitude shift keying b. frequency shift keying c. phase shift keying d. All of the above

b. frequency shift keying

Which of the following is a geographic location that is served by a wireless data system and provides network access to mobile users? a. RFID tag b. hotspot c. GPS d. WMS

b. hotspot

A ____ VPN is a user-to-LAN connection used by remote users. a. peer-to-peer b. remote-access c. remote-to-LAN d. site-to-site

b. remote-access

An employee who purchases a wireless access point and brings it into the office to provide personal wireless access has installed a ____. a. wardriving point b. rogue access point c. VoWLAN handset d. VoIP handset

b. rogue access point

Which system is preferred for 802.11 WLANs that operate at speeds in excess of 11 Mbps? a. DSSS b. FHSS c. OFDM d. All are equally preferred

c. OFDM

Which encryption protocol is used for 802.11i/WPA2? a. PSK b. TKIP c. RSN d. CCMP

d. CCMP

Which is true about planning for a VoWiFI network? a. the signal strength at the cell boundary should be below -70 dBm b. use of MIMO is a significant advantage in a VoWiFi handset c. adjacent cells should be within 3 meters of each other but should not overlap d. adjacent cells should overlap by 6-10 dB

d. adjacent cells should overlap by 6-10 dB

A Waterfall View on a spectrum analyzer shows the aggregate energy collected since the start of a session. True False

False

De facto standards are official standards. True/False

False

Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization. True/False

False

The point of RF site tuning is to locate where APs should be mounted. True/False

False

WPA2 uses a block cipher rather than a stream cipher. True/False

False

A WLAN can contain many entry points, making security more difficult than with a wired LAN. True/False

True

A protocol analyzer can be hardware or software and can fully decode Application-layer protocols. True False

True

Electromagnetic waves travel through space at the speed of light. True/False

True

802.1X utilizes EAP. Which is a correct statement about EAP? a. EAP is a framework for transporting authentication protocol b. EAP uses two types of packets to perform authentication c. EAP is one of the strongest encryption protocols d. EAP is used by WEP2 to resolve some of WEP2's weaknesses

a. EAP is a framework for transporting authentication protocol

____ modulation changes the number of waves representing one cycle. a. Frequency b. Phase shift c. Amplitude d. Phase

a. Frequency

____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures. a. Information security b. VoWLAN c, FCC d. FDA

a. Information security

DSSS uses a bit pattern called a ____ code to transmit bits. a. chipping b. hopping c. setting d. dwelling

a. chipping

The term ____ describes the rate of electrical flow. a. current b. voltage c. electrical power d. resistance

a. current

What units are used to measure RF power gain and loss on a relative scale? a. dB b. V c. mW d. ohm

a. dB

When is the first step in the access point configuration and location part of the site survey? a. decide which type of AP to use b. determine antenna type c. configure the AP for optimum power output d. place the AP in a temporary location

a. decide which type of AP to use

The time difference of the arrival of signals as copies travel along different paths is referred to as which of the following? a. delay spread b. multipath c. return loss d. system operating margin

a. delay spread

Which of the following is true about infrared transmissions? a. diffused transmission relies on reflected light b. directed transmission has a wide-focused beam c. they are most reliable outdoors d. mobility is their greatest strength

a. diffused transmission relies on reflected light

Signature-based monitoring can be described as which of the following? a. examines network traffic, activity, and transactions, and looks for well-known patterns b. attempts to answer the question: "will this do something harmful if allowed to execute?" c. compiles a baseline of normal activities and looks for statistical anomalies d. continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected

a. examines network traffic, activity, and transactions, and looks for well-known patterns

What was a design goal of WPA? a. fit into the existing WEP engine b. a long-term solution to WEP vulnerabilities c. require users to replace wireless hardware to achieve better security d. All of the above

a. fit into the existing WEP engine

The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following? a. hijacking the wireless connection b. inserting network traffic c. reading data d. denial of service

a. hijacking the wireless connection

What provides the greatest source of RF interference? a. mirror b. security window c. interior wall d. water

a. mirror

Wireless NICs perform the same function as a wired NIC except for which of the following? a. no RJ-45 connection b. no MAC address c. transmits bits d. requires a driver

a. no RJ-45 connection

What are frequently the weakest link in information security? a. passwords b. malfunctioning routers c. unmanaged switches d. wireless networks

a. passwords

Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network? a. session b. transport c. presentation d. network

a. session

How does OFDM work? a. signals are broken up and the parts are sent in parallel b. the same signal is sent on multiple channels c. a signal is sent over a wired network at the same time as the wireless network d. one signal is sent twice on the same channel

a. signals are broken up and the parts are sent in parallel

Searching for unprotected wireless networks is called what? a. war driving b. WLAN trolling c. battle testing d. wireless fishing

a. war driving

Which of the following are enhancements of the 802.11n standard? a. 20 MHz channels and fixed guard interval b. 40 MHz channels and variable guard interval c. bonding of two 10 MHz channels d. operation in the 40 GHz frequency range

b. 40 MHz channels and variable guard interval

Which of the NIST guidelines below requires using a modified boot loader to access RAM for analysis?​ a. Manual extraction b. Hex dumping c. Chip-off d. Micro read

b. Hex dumping

The ____ establishes standards for telecommunications. a. FDA b. IEEE c. PDA d. VoIP

b. IEEE

Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP? a. NIC blocking b. MAC address filtering c. Network blocking d. IP address filtering

b. MAC address filtering

If you are installing an access point on a ceiling, but find there are no electrical outlets nearby to provide power to the AP, what technology should you deploy? a. Virtual Wifi b. POE c. SoftAP d. WCN

b. POE (Power Over Ethernet)

What is a difference between RMON and SNMP? a. RMON is found on enterprise-level APs b. RMON uses dedicated devices c. RMON uses MIBs d. SNMP gathers network statistics

b. RMON uses dedicated devices

Which value can be measured by the circuitry on a wireless NIC to determine if it is clear to send its transmission? a. dB b. RSSI c. mW d. SNR

b. RSSI

DSSS uses a bit pattern called a ____ code to transmit bits. a. setting b. chipping c. dwelling d. hopping

b. chipping

DSSS makes it possible to share the frequency with similar devices by assigning each device a unique chipping code, a function known as what? a. chipping variation b. colocation c. multiplexing d. intersymbol assignment

b. colocation

Which site survey analyzer setting sets the number of times a transmission will be repeated if an acknowledgment (ACK) frame is not returned by the destination device? a. percent success threshold b. data retries c. continuous link test d. delay between packets

b. data retries

Which of the following typically resides between the wireless network and the wired network, serving as the entry point to the wired network while providing encryption and authentication services? a. residential WLAN gateway b. enterprise encryption gateway c. point-to-multipoint remote wireless bridge d. point-to-point authenticating bridge

b. enterprise encryption gateway

Signature-based monitoring can be described as which of the following? a. compiles a baseline of normal activities and looks for statistical anomalies b. examines network traffic, activity, and transactions, and looks for well-known patterns c. continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected d. attempts to answer the question: "will this do something harmful if allowed to execute?"

b. examines network traffic, activity, and transactions, and looks for well-known patterns

Which of the following is a viable option for a large enterprise or campus wireless network? a. autonomous access point b. lightweight access point c. fat access point d. Soft access point

b. lightweight access point

The primary advantage of wireless technology is ____. a. easier and less expensive installation b. mobility c. security d. disaster recovery

b. mobility

Which of the following is NOT an information security layer? a. people b. prevention c. procedures d. products

b. prevention

Which problem did dynamic WEP resolve? a. denial of service attacks b. weak IV problem c. man-in-the-middle attacks d. dictionary attacks

b. weak IV problem

What does a loss of 10 decibels mean with respect to the percent of power loss in mW? a. 50% b. 10% c. 90% d. 30%

c. 90%

IEEE has divided the ____ layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). a. Session b. Physical c. Data Link d. Transport

c. Data Link

802.1X utilizes EAP. Which is a correct statement about EAP? a. EAP is used by WEP2 to resolve some of WEP2's weaknesses b. EAP is one of the strongest encryption protocols c. EAP is a framework for transporting authentication protocol d. EAP uses two types of packets to perform authentication

c. EAP is a framework for transporting authentication protocol

____ modulation changes the number of waves representing one cycle. a. Phase b. Amplitude c. Frequency d. Phase shift

c. Frequency

_____ ensures that the information is correct and that no unauthorized person or malicious software has altered it. a. Availability b. Access control c. Integrity d. Confidentiality

c. Integrity

Amongst the most common transport encryption algorithms, used to securely transmit documents over the Internet is which of the following? a. SNMP b. HTTP c. SSL d. SSH

c. SSL

Which of the following is NOT a typical AP status tagged by a WIDS/WIPS system? a. Rogue b. Monitored c. Unknown d. Authorize

c. Unknown

____ is software (or sometimes hardware) that allows to view the contents of wireless packets. a. Spyware b. Malware c. Wireless packet sniffer d. Adware

c. Wireless packet sniffer

Which of the following is NOT a component of using SNMP for network monitoring? a. software agent b. MIB c. event log d. management station

c. event log

Which of the following is NOT a component of using SNMP for network monitoring? a. management station b. software agent c. event log d. MIB

c. event log

​On what mobile device platform does Facebook use a SQLite database containing friends, their ID numbers, and phone numbers as well as files that tracked all uploads, including pictures? a. Blackberry b. Android c. ​iPhone d. Windows RT

c. iPhone

What does WPA include that is designed to prevent an attacker from conducting man-in-the-middle attacks? a. cyclic redundancy check b. preshared key c. message integrity check d. a temporal key

c. message integrity check

Which of the following is true about RADIUS? a. it is primarily used in low-volume SOHO applications b. RADIUS clients, such as laptops, request authentication from a server c. messages are never sent from the wireless device to the RADIUS server d. it is used by WPA personal as the preferred authentication method

c. messages are never sent from the wireless device to the RADIUS server

Which type of RF signal uses only a single frequency for transmission? a. orthogonal frequency b. spread-spectrum c. narrowband d. broadband

c. narrowband

If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode. a. root mode b. repeater mode c. nonroot mode d. access point mode

c. nonroot mode

What does WPA use for authentication? a. Kerberos b. certificates c. preshared key d. open system authentication

c. preshared key

Which is caused by small objects or rough surfaces as an RF signal travels through the air? a. reflection b. refraction c. scattering d. nullification

c. scattering

Which of the following provides the management and configuration functions for a thin access point? a. mesh access point b. fat access point c. wireless LAN controller d. PoE controller

c. wireless LAN controller

Which of the following is an electromagnetic wave? a. light b. heat c. radio d. All of the above

d. All of the above

____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent. a. Wireless packet sniffer b. VoWLAN c. VoIP d. Malware

d. Malware

A rogue AP can be described as which of the following? a. an AP whose security settings have not been set b. an AP designed to mimic an authorized AP c. an AP that has malfunctioned and allows unauthorized users to access it d. an unauthorized AP brought into the enterprise network

d. an unauthorized AP brought into the enterprise network

An attacker spoofs frames to prevent a client from remaining connected to the WLAN. What type of an attack is this? a. RF jamming b. man-in-the-middle c. hijacking d. denial of service

d. denial of service

A ____ attack on WEP involves identifying two packets derived from the same IV. a. capture b. weak key c. pseudo-random number d. keystream

d. keystream

On wireless networks, ____ attacks are commonly done by attackers setting up an evil twin. a. DoS b. spoof c. weak key d. man-in-the-middle

d. man-in-the-middle

Which OSI model layer picks the route packets take? a. presentation b. transport c. physical d. network

d. network

Which type of WIDS/WIPS sensor uses dedicated sensors for scanning the RF for attacks? a. embedded b. AP c. integrated d. overlay

d. overlay

Which type of remote wireless bridge connection is used to connect multiple LAN segments, or buildings together? a. segment-to-segment b. multipoint-to-multipoint c. point-to-point d. point-to-multipoint

d. point-to-multipoint

Which of the following are NOT among the several defenses against attacks? a. physical security b. using security policies c. security training d. random employee security scans

d. random employee security scans

Which of the following is NOT typically included in an impact analysis? a. risk mitigation b. threat evaluation c. asset identification d. remediation process

d. remediation process

Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____. a. mobility b. network reliability c. installation costs d. security

d. security

Which of the following is NOT a major part of an autonomous access point? a. antenna b. wired network interface c. bridging software d. wireless switch

d. wireless switch


Related study sets

AP Literature Mrs. Baer Mid-term Exam

View Set

Developmental Stages: Infancy to Adolescents

View Set

Chapter 38: Caring for Clients with Cerebrovascular Disorders

View Set

Adventurous Alice SAT Word List 76-100

View Set

PSYC 4100: Chapter 6 What is test reliability/precision?

View Set

Microbiology Lab Final Exam Study Guide

View Set

Chapter 6 Sexual Behaviors:Practice Quiz

View Set