Module 11 Networks
In the 2.4 GHz band, which of the following channels do not overlap with the other channels? [Choose all that apply]
1 6 11
Which of the following security features are provided by Internet Protocol Security (IPsec)? [Choose all that apply]
1. Authentication 2. Encryption 3. Integrity
Which of the following encryption key size is used by Wi-Fi Protected Access 2 (WPA2)?
128-bit
Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?
802.11ac (802.11ac can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second). 802.11n has a network speed of 600 Mbps and a maximum range of 230 feet. 802.11g provides data rates of up to 54 Mbps. 802.11b provides data rates of up to 11 Mbps using the 2.4 GHz band.)
To prevent DNS information from being altered during transmission, which of the following protocol should you use?
DNSSEC
Which of the following protocol is used for time synchronization in a system?
NTP
In which of the following wireless mode's can anyone connect to the wireless network without authentication?
Open
Which of the following security protocols is used by Secured file transfer protocol (SFTP)?
SSH
Which of the following security protocol is used by Protected Extensible Application Protocol (PEAP)?
TLS
Which of the following do you protect by implementing Secure Real-Time Protocol (SRTP)?
VoIP
Nyla is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?
a. Bluesnarfing
Which of the following is NOT a means by which a threat actor can perform a wireless denial of service attack?
a. IEEE 802.iw separate
Which of these is a 24-bit value that changes each time a packet is encrypted and then is combined with a shared secret key?
a. IV
Fatima has just learned that employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability?
a. It allows an attacker to bypass network security configurations.
Imani has been asked to purchase wireless LAN controllers (WLCs) for the office. What type of APs must she also purchase that can be managed by a WLC?
b. Controller AP
Which of these does not require authentication?
b. Open method
What is a difference between NFC and RFID?
b. RFID is designed for paper-based tags while NFC is not.
Which WPA3 security feature is designed to increase security at the time of the handshake?
b. SAE
Which of these is NOT a risk when a home wireless router is not securely configured?
b. Wireless endpoints must be manually approved to connect to the WLAN.
Which of these is the encryption protocol for WPA2?
c. CCMP
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
c. EAP-FAST
Zariah is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is Zariah describing?
c. Evil twin
Which of these is a vulnerability of MAC address filtering in a WLAN?
c. MAC addresses are initially exchanged unencrypted.
Aaliyah has been asked to do research in a new payment system for the retail stores that her company owns. Which technology is predominately used for contactless payment systems that she will investigate?
c. Near field communication (NFC)
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
c. PIN method
Which technical specification of the Wi-Fi Alliance is the same as ad hoc mode in a Wi-Fi network?
c. Wi-Fi Direct
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered?
d. Captive portal
Maryam is explaining the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?
d. It is a framework for transporting authentication protocols.
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
d. RFID spectrum
Which of these is NOT a type of wireless AP probe?
d. WNIC probe