Final Exam for CDS 444
Service set identifier (SSID) cloaking prevents the advertising of a wireless LAN (WLAN) SSID. Doing so hides the network from unauthorized client stations. Which of the following can defeat network cloaking?
A protocol analyzer
Which of the following is used to encrypt data of arbitrary lengths and tends to have less overhead and better throughput performance?
A stream cipher
A malicious attacker is using an inexpensive directional antenna to detect and monitor a business's wireless network from his car. The vehicle is parked on the street about 100 yards from the target building.
Layer 2 (Data Link Layer)
What is true mobile device management (MDM) and mobile application management (MAM)
MDM handles device activation, enrollment, and provisioning, whereas MAM assists in delivering software.
You are a networking consultant who has been asked to penetration test the network of a small business. The company's tech support person gave you WPA2-PSK credentials and the service set identifier (SSID) of a wireless access point. You try to log on to the network but cannot connect. What is the most likely problem and how can you overcome it?
Media access control (MAC) filtering is in place. Scan the network, and the steal and spoof a genuine MAC address.
Which of the following provides a distribution platform for apps with application lifestyle management and handles software licensing, configuration, and usage tracking?
Mobile application management (MAM)
What is the Major difference Android and other mobile operating systems apart from its open system model?
One the owner gives permissions to an application, the device will not prompt for permission again.
A sports arena wants to provide wireless connectivity to spectators to allow them to interact during games. Spectators are considered a transient group, needing short-term access without a secure connection. Arena management desires a solution that requires little to no active management after the initial setup. Which solution is the most appropriate to arena management and spectators' needs?
Open Access
Which mobile device threat or exploit involves hijacking the device to participate in mass attacks on a third-party network?
Participating in distributed denial of service (DDoS) attacks
Under what circumstance would you most likely use a wireless extender or repeater in a small office/home office (SOHO) design?
Persistent low signal
A company's IT security team is considering a new security awareness program for employees. The team believes mobile users need mobile-specific awareness training, especially regarding threats that are more likely to occur due to the relatively small mobile screen. What training subject is most relevant to this scenario?
Phishing attacks
When placing an access point for a small office/home office (SOHO) to maximize security, which of the following is a typical liability?
Placing the access point near an exterior wall or window.
Which of the following is created by app developers specifically to monetize their applications through connections to aggressive third-party advertising networks?
Potentially unwanted application (PUA)
The use of a walled garden is most closely associated with which of the following?
Quarantining
Which of the following is not a major security improvement in Wi-Fi Protected Access version 3 (WPA3)?
RADIUS-based authentication
The volunteer network technician of a school recently installed wireless access, granting teachers access to a wireless local area network (WLAN). After a few weeks, teachers noticed that the online gradebooks had been tampered with and notified the network technician, who suspected that students had been eavesdropping on the wireless communications. What improvement should the network technician make to the WLAN?
Require encryption to be used between devices and the wireless access points.
Kun is a junior level accountant in his company. He wanted to use his personal laptop and tablet for work purposes but could not locate a wireless access point to which to connect. He brought in a personal access point and connected it to the corporate network. Sometime later, the company's cybersecurity expert informed him that sensitive financial information had been accessed and subsequently sold on the dark web. This activity has been traced to Kun's access point. What term best describes the unauthorized access point?
Rogue
An evil twin is which of the following?
Rogue Access Point
Which mobile phone threat or exploit is used for eavesdropping and potential extortion?
SMS redirection
Which component of the android security architecture ensures that native code is constrained by the application sandbox?
Security at the OS Linux kernel
Bluetooth devices that use which mode are designed and produced with no security features, making them vulnerable to attack?
Security mode 1
You are a networking consultant who has been asked to penetration test the network of a small business. You do not have any details regarding the network. You initially notice that employees are using laptops and tablets but you cannot find any available Wi-Fi network. What basic security measure is being deployed, and how can you defeat it?
Service set identifier (SSID) cloaking; using Kismet
As Google and Apple have released operating system version updates over the years, which of the following has occurred?
Some security principles were relaxed
Considering the Open Systems Interconnection (OSI) Reference Model layers, what denial of service (DoS) attack is unique to wireless networks?
Spoofed MAC address sending authenticate requests on the media access control layer
Which of the following is not a Bluetooth vulnerability?
Switching off Discovery mode
Which component of the Apple iOS architecture relates to sandbox testing and application isolation?
System architecture
Ashley is a wireless network engineer for a company. She is visiting a branch office for the first time in several month. She notices that the furniture has been rearranged and that the trees and shrubs surrounding the building have been trimmed recently. What is her concern regarding the impact of those changes on the wireless LAN (WLAN) and radio-frequency (RF) signals?
That the WLAN's RF signal will extend beyond the boundaries of the building.
Android applications rely on process sandboxing to ensure security. Security issues created in one application will not affect other applications. The same isolation applies to resources, memory, and inter-process communications. What is the underlying attribute that permits Android applications to run like this?
The Linux kernel multi-user environment
Rooting, or overriding Android operating system (OS) security, gives the user root (super-user) permissions on an Android device. Which subset or section of the Android operating system is rooted?
The OS kernel
A remote authentication dial-in user service (RADIUS) client is often built into a wireless access point (WAP). Which of the following best represents the WAP's role versus the RADIUS server in authenticating the client?
The WAP sends an authentication request to the RADIUS server.
In android, only trusted applications can access protected application programming interfaces (APIs), such as those associated with such as the camera and location data. Trusted APIs are protected by permissions. Which of the following is not true of permissions?
The owner can revoke an installed application's individual permissions at any time.
Which of the following is not a feature of windows phone architecture
The release of only one new phone per year.
If Microsoft and Google implement their own versions of Handoff-like technology, what is a likely outcome?
The sandbox concept will be relaxed
What is the purpose of jailbreaking an Apple iOS device?
To give users privileged control and install applications from any source.
What is the purpose of an application sandbox?
To run applications in isolation
True or False? A best practice for small office/home office (SOHO) environment is to keep wireless access points in a locked closet.
True
True or False? A captive portal is a common technique used by hotspots
True
True or False? A logical place to locate a visitor access point is within a demilitarized zone (DMZ)
True
True or False? A security best practice is to shut down all switch ports that are not in use.
True
True or False? A wireless extender or wireless repeater is a device that uses the same frequency and channel to overlap the original basic service set (BSS) coverage area of a wireless network
True
True or False? Android developers typically write their apps in Java and then convert them to run on the Dalvik platform on all Android devices.
True
True or False? Apple's application provenance requires developers who wish to publish consumer applications to distribute and sell through the Apple App Store.
True
True or False? Google Android has strict privacy and security measures that prevent unscrupulous developers from gaining access to location data without explicit permission.
True
True or False? The Wi-Fi protected access 3 (WPA3) protocol specifically defines a new handshake that eliminates the passphrase handshake vulnerability with WPA2
True
True or False? War driving is an attack from outside the boundaries of the home or business premises.
True
True or False? Wardriving is a tool for finding targets of opportunity.
True
True or False? Whereas Apple typically releases only one new phone per year, Android devices are released by the hundreds.
True
True or false? Used with Simple Network Management Protocol Version 3 (SNMPv3), a message information base (MIB) is a database for storing network information such as latency and jitter.
True
True or false? Wi-Fi Protected Access 3 (WPA3) introduced "Individualized data encryption."
True
A faulty transmitter on a company's wireless LAN (WLAN) is constantly transmitting. Because only one radio station can transmit at a time, none of the other devices can communicate. This creates a denial of service (DoS). Which of the following attacks is being used.
Unintended
You are a networking consultant. You have been asked to penetration test the network of a small business. Your tests revealed that the wireless network needs to be more secure. Which of the following is the best solution for a small business.
Use WPA3 with complex passwords
Which of the following is a type of internal user segmentation that uses access control lists (ACLs) and service set identifiers (SSIDs)
Virtual Local area network (VLAN)
Which internet protocol (IP) service is used to secure remote access or inter-bridge connections in peer-to-peer configurations?
Virtual Private Network
Which of the following was viewed as an interim solution to address serious weakness in another data protection technology?
WPA
Which of the following provides data privacy over public networks, protection against brute force attacks, and perfect forward secrecy.
WPA3
There are two opposing models of source code management for mobile operating systems. One is the open source model, which developers can freely alter. The Android operating system follows this model. Apple's operating system iOS follows the other model. Which of the following best characterizes the Apple iOS philosophy?
Walled Garden
Of the following, which is the best to use in an enterprise environment?
Wi-Fi Protected Access 3 (WPA3)
What was the successor to Windows Phone 8.1
Windows 10 Mobile
What is a pre-robust security network (RSN) layer 2 encryption method that protects information in the payload from layers 3 through 7?
Wired Equivalent Privacy (WEP)
Which of the following is not true of Bluetooth Security modes?
With Bluetooth security modes 1 through 3, no service security trust model is applied.
You are a networking consultant who has been asked to penetration test the network of a small business. You located a target wireless network and can connect, but you cannot authenticate because it uses WPA2-PSK encryption. How can you bypass the encryption?
You can try social engineering techniques to get the shared password.
All of the following are benefits of Wi-Fi as a Service (WaaS), except:
hands-on maintenance
Susan is a developer. She wants to create a mobile application for either an Android device or an Apple iOS device. Because Susan is security conscious, her goal is to ensure hackers cannot modify an application after it is released. What platform(s) can she release the application on, and why?
iOS, kept secure by application provenance.
True or False? Hard Drive Encryption protects data in motion.
False
True or False? In Apple iOS, each app runs as a specific "user", with its own user identity (UID). In Android, all apps run as the same user ("mobile").
False
True or False? Media Access Control (MAC) addresses cannot be spoofed.
False
True or False? Sending premium-rate SMS messages is an exploit that is used for eavesdropping and potential extortion.
False
True or False? Whereas Apple iOS and Windows Phone use a sandbox architecture approach, Google Android does not.
False
Why are Android operating systems (OS) phones difficult to support in a Bring Your Own Device (BYOD) environment?
Fragmented OS
Of the following, where is it most important to use a virtual private network (VPN) connection for data security
In a public space such as a coffee shop.
Tunnel mode, transport mode, authentication header (AH), and encapsulation security payload (ESP) are closely associated with:
Internet protocol security (IPSec)
Which of the following is not true of Handoff?
It allows a user to switch between and iPhone and a Windows phone device seamlessly.
What makes the Apple iPhone with iOS ideal for bring your own device (BYOD)?
It has one operating system and only one or two models of each version of the device.
Which of the following best describes bluesnarfing?
It is a technique whereby an attacker gains access to unauthorized information on a Bluetooth-enabled device.
Which of the following is not true of Open System Authentication (OSA)?
It is the most secure method of Layer 2 authentication.
Which of the following is not true of jailbreaking Apple iOS?
It supports the walled garden security approach
Which of the following is used to provide an internet protocol (IP) address and a network configuration to previously authenticated clients?
Authenticated Dynamic Host Configuration Protocol (DHCP)
Madison is the assistant manager of her company's finance department. She receives an email from the IT department director requesting the password and service set identifier (SSID) of her department's wireless access point. Madison suspects this is some form of social engineering because the IT director should already have access to that information. What form of social engineering is possibly being used?
Authority Scam
Domingo is a network security consultant hired by a multinational corporation. He is assessing security controls in the client's IT infrastructure. The client has proof that it has been the victim of a multi-phased attack carried out by a nation state-backed hacker consortium over the course of 14 months. The group stole highly valuable proprietary information. What kind of attack is the client describing?
Advanced persistent threat (APT)
Which of the following uses deep packet inspection to look inside packets traversing a network
An intrusion prevention system (IPS)
Which of the following can scan the network, looking for security issues and vulnerabilities on Android devices?
Android Framework for Exploitation
Ad hoc networks are a known risk in corporate environments. Which of the following is true of ad hoc networks in a corporate setting?
Ad hoc connections should be avoided whenever possible.
A malicious hacker accesses a company's wireless network. The hacker spoofs a local wireless device by answering a particular type of request, which is then stored in a table in the network. The spoofed devices is identified as a legitimate network node because this service does not verify that the response comes from a legitimate source. What is the name of this service?
Address Resolution Protocol (ARP)
Which of the following is used as the encryption algorithm for Internet Protocol Security (IPSec) virtual private networks (VPNs)?
Advanced Encryption Standard (AES)
Which of the following is not a feature of Apple iOS architecture
Bitlocker disk encryption
Which aspect of an enterprise security policy is most likely to address remote authentication dial-in user service (RADIUS) and the deployment of thin access points?
Centralized versus distributed design and management
On a network, which type of guest access enables all visitors to share a known password for user authentication?
Common guest password
Which of the following is an encapsulation method used to securely transport keying material for encryption over wireless and Point-to-point protocol (PPP) networks?
Extensible Authentication Protocol (EAP)
True or False? An access point with a built-in Remote Authentication Dial-In User Service (RADIUS) client cannot communicate directly with a RADIUS server
False
True or False? Android devices cannot download applications from any third party
False
True or False? Android does not have the ability to encrypt data through cryptographic application programming interfaces (APIs).
False
True or False? Assuming the same level of skill, an outsider is a higher risk to security than a trusted insider.
False
True or False? Exploits on the Windows Phone OS are typically due to breaches of internal security rather than breaches of trust.
False
Which of the following enables external user segmentation in which a visitor Wi-Fi network is on its own Wi-Fi subnet?
Demilitarized Zone (DMZ)
Which component of the Apple iOS architecture involves passwords, PINS, and remote wipe?
Device Access
Which component of the Android security architecture identifies application authors and deters or prevents malware?
Digital signing of applications
Which of the following provides a means to identify neighboring devices on a network and create a network map?
Discovery protocols
Which of the following does not pose a significant security risk to users of Android smartphones?
Downloading apps from google play
Which of the following is true of Android security model?
Each Android app runs in its own Dalvik virtual machine (VM) and each VM is isolated within its own Linux process.