Security+ Network Security Fundamentals Chapter 9 and Chapter 10

Ace your homework & exams now with Quizwiz!

Captive portal access point

How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?

Wired Equivalent Privacy (WEP)

An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.​

rogue

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

Bluesnarfing​

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection​

False

An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP​, with the intent to redirect client devices.

False

Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.

True

Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.

supplicant

If the EAP authentication is successful, a success packet is sent to the ____________________.

Google Glass

Select below the option that represents a wearable technology:​

EAP-FAST

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:

Location services​

Services that can identify the location of a person carrying a mobile device or a specific store or restaurant.​

True

Simply using a mobile device in a public area can be considered a risk.

Active slave

Slave devices that are connected to a piconet and are sending transmissions are known as what?

iOS

The Apple _____________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.

False

The CardBus is a 64-bit bus in the PC card form factor.

False

The Google Android mobile operating system is a proprietary system, for use on only approved devices.​

Bluetooth v1.2

The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?

​ExpressCard

The PC Card and CardBus devices are being replaced by what technology?

48 bits

The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?

​Type I

What PC Card type is typically used for memory?​

​Secure Digital Input Output (SDIO)

What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?​

Access Point

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?

32

What is the maximum number of characters that can exist within an SSID name?

33 ft

What is the maximum range of most Bluetooth devices?

LEAP

What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?

Bluejacking

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

evil twin

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

​Mobile Device Management (MDM)

What type of management system below can help facilitate asset tracking?

scanning

When a wireless device looks for beacon frames it is known as ____________________.

13

When using AES-CCMP, the AES-256 bit key requires how many rounds?​

PEAP

Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?

AES-CCMP

Which encryption protocol below is used in the WPA2 standard?

Error

Which of the following choices is not one of the four types of packets used by EAP?

authenticator

Which option below is responsible for the issuing of EAP request packets?

​Enable a lock screen

​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

iOS

​What mobile operating system below requires all applications to be reviewed and approved before they can be made available on the public store front?

​Personal digital assistant (PDA)

​What term below describes a hand-held mobile device that was intended to replace paper systems, and typically included an appointment calendar, an address book, a "to-do" list, a calculator, and the ability to record limited notes?

​Inventory control

​What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?

​Track stolen devices

​Which of the following selections is not one of the features provided by a typical MDM?

False

Bluetooth devices are not backward compatible with previous versions.

Personal Area Network

Bluetooth is an example of what type of technology below?

Initialization vector (IV)

A 24-bit value used in WEP that changes each time a packet is encrypted.​

Bluesnarfing

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?

True

A QR code can store website URLs, plain text, phone numbers, e-mail addresses, or virtually any alphanumeric data up to 4296 characters.​

​A video

A QR code can't contain which of the following items directly?

Quick Response (QR) code

A _____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.​

​Lock screen

A technology that prevents a mobile device from being used until the user enters the correct passcode.​

True

APs use antennas that radiate a signal in all directions.

​Geo-tagging

Adding or allowing geographical identification data in a mobile app​

1234

​What PIN is considered to be the most commonly used PIN?

False

Mobile devices such as laptops are stolen on average once every 20 seconds.​

flash memory

Mobile devices use _____________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.​

​Location services

Mobile devices with global positioning system (GPS) abilities typically make use of:​

parked

On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.

scatternet

Piconets in which connections exist between different piconets are known as a:

Off-boarding​

The ability to quickly remove devices from the organization's network​

On-boarding​

The ability to rapidly enroll new mobile devices.​

​Remote wiping

The ability to remote erase sensitive data stored on a mobile device​

Preshared key (PSK)​

The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.​

​Wi-Fi Protected Access 2 (WPA 2)

The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.​

​Mobile application management (MAM)

The tools and services responsible for distributing and controlling access to apps.​

​Geo-fencing

Using a mobile device's GPS to define geographical boundaries where an app can be used.​

Tablets

_____________ are portable computing devices that are generally larger than smartphones and smaller than notebooks, and are focused on ease of use.​

Geo-fencing

_________________ uses a device's GPS to define geographical boundaries where an app can be used.​

Bluetooth

____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.

​Web-based

​Select below the type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated media player:

site survey

​A __________________ is an in-depth examination and analysis of a wireless LAN site.

​RS232

​A laptop may have multiple hardware ports. Which of the following is not a typical port included on a laptop?

​Near field communication (NFC)

​A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity

Secure digital (SD)

​A small form factor storage media of a variety of different types and sizes.

​Bluejacking

​An attack that sends unsolicited messages to Bluetooth-enabled devices

Wi-Fi Protected Setup (WPS)​

​An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.

​Subnotebook

​An ultrabook is an example of what type of a portable computer?

​Mobile Application Management

​How can an administrator manage applications on mobile devices using a technique called "app wrapping?"

RF Jamming​

​Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occuring.

​Asset tracking

​Maintaining an accurate record of company-owned mobile devices

​Credential management

​Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:

​War driving

​Searching for wireless signals from an automobile or on foot using a portable computing device

​Removable media storage

​Select below the item that is not considered to be a basic characteristic of mobile devices:

​Extreme Capacity (SDXC) These are: High capacity (SDHC) ​Standard capacity (SDSC) Secure Digital Input Output (SDIO)

​Select below the option that is not one of the SD format card families:


Related study sets

Chapter 25: Cold War America (1945-63)

View Set

Networking Essential Notes 93/94

View Set

GENE MANIPULATION BIOLOGY UNIT 4 SAC

View Set

Module 18 Water Heaters and Combination Systems

View Set

Primavera Economy Unit 5 Workbooks and Checkpoints

View Set