EEL4806 Chapter 11

Ace your homework & exams now with Quizwiz!

What would a signal range for a Bluetooth device commonly be? A. 300 ft. B. 3,000 ft. C. 75 ft. D. 500 ft.

300 ft.

What tool would allow you to run an evil twin attack? A. Wireshark B. Ettercap C. Wifiphisher D. Aircrack-ng

Wifiphisher

What tool could you use to enable sniffing on your wireless network to acquire all headers? A. Ettercap B. Tcpdump C. Aircrack-ng D. Airmon-ng

Airmon-ng

Why is bluesnarfing potentially more dangerous than bluejacking from the standpoint of the victim? A. Bluejacking sends while bluesnarfing receives. B. Bluejacking receives while bluesnarfing sends. C. Bluejacking installs keyloggers. D. Bluesnarfing installs keyloggers.

Bluejacking receives while bluesnarfing sends.

What is the policy that allows people to use their own smartphones on the enterprise network? A. Bring your own device B. Use your own device C. Bring your own smart device D. Use your own smart device

Bring your own device

What is the four-stage handshake used for? A. Passing keys B. Deriving keys C. Encrypting messages D. Initialization seeding

Deriving keys

What is the purpose of a deauthentication attack? A. Disabling stations B. Forcing stations to reauthenticate C. Reducing the number of steps in the handshake D. Downgrading encryption

Forcing stations to reauthenticate

How many stages are used in the WPA handshake? A. Two B. Four C. Three D. One

Four

What is the SSID used for? A. Encrypting messages B. Providing a MAC address C. Identifying a network D. Seeding a key

Identifying a network

What is the purpose of performing a Bluetooth scan? A. Identifying open ports B. Identifying available profiles C. Identifying endpoints D. Identifying vendors

Identifying endpoints

What are the two types of wireless networks? A. Star and ring B. Bus and hybrid C. Infrastructure and hybrid D. Infrastructure and ad hoc

Infrastructure and ad hoc

What part of the encryption process was weak in WEP? A. Keying B. Diffie-Hellman C. Initialization vector D. Seeding vector

Initialization vector

What wireless attack would you use to take a known piece of information in order to be able to decrypt wireless traffic? A. Sniffing B. Deauthentication C. Key reinstallation D. Evil twin

Key reinstallation

What would you use a bluebugging attack for? A. Identifying Bluetooth devices nearby B. Listening to a physical space C. Enabling a phone's camera D. Gathering data from a target system

Listening to a physical space

What mode has to be enabled on a network interface to allow all headers in wireless traffic to be captured? A. Promiscuous B. Monitor C. Radio D. Wireless LAN

Monitor

What wouldn't you see when you capture wireless traffic that includes radio headers? A. Capabilities B. Probe requests C. SSIDs D. Network type

Network type

What types of authentication are allowed in a WPA-encrypted network? A. Handshake and personal B. Personal and enterprise C. Enterprise and handshake D. 802.11 and personal

Personal and enterprise

What kind of access point is being used in an evil twin attack? A. Infrastructure B. Ad hoc C. WPA D. Rogue

Rogue

How does an evil twin attack work? A. Phishing users for credentials B. Spoofing an SSID C. Changing an SSID D. Injecting four-way handshakes

Spoofing an SSID

What method might you use to successfully get malware onto a mobile device? A. Using the Apple Store or Google Play store B. Using external storage on an Android C. Using a third-party app store D. Jailbreaking

Using a third-party app store


Related study sets

Chapter 53: Caring for Clients with Disorders of the Female Reproductive System

View Set

analyzing Adjustments and Extending Account Balances on a Work Sheet

View Set

Policing System and Practice review 4

View Set

ATI: Nurse Logic 2.0 Priority Setting Frameworks Beginner

View Set

Chapter 3: School, Family,and Community Collaboration

View Set

National Test Chapter 4 - Real Estate Law

View Set

Ch 51: Assessment and Management of Patients With Diabetes Mellitus

View Set