Security Pro 8.2.7 Section Quiz

Ace your homework & exams now with Quizwiz!

Which of the following sends unsolicited business cards and messages to a Bluetooth device? Slamming Bluebugging Bluesnarfing Bluejacking

Bluejacking

Which type of RFID tag can send a signal over a long distance? Passive NFC Active Bluetooth

Active

Which of the following best describes an evil twin? An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information. A threat agent that marks the outside of buildings to indicate the presence of a wireless network. A Bluetooth device that receives mobile phone commands via bluebugging. An access point that is added to a network by an internal employee to provide unauthorized network access.

An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.) Conduct a site survey. Check the MAC addresses of devices connected to your wired switch. Implement an intrusion prevention system (IPS). Implement a network access control (NAC) solution. Implement an intrusion detection system (IDS).

Conduct a site survey. Check the MAC addresses of devices connected to your wired switch.

Which type of interference is caused by motors, heavy machinery, and fluorescent lights? EMI RFI RFID NFC

EMI

Which type of attack is WEP extremely vulnerable to? Bluesnarfing Cloning IV attack Evil twin

IV attack

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing? Disassociation Jamming Cloning Bluesnarfing

Jamming

An attacker has intercepted near-field communication (NFC) data and is using that information to masquerade as the original device. Which type of attack is being executed? Bluesnarfing Relay Disassociation Cloning

Relay

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this? Social engineering Rogue access point Man-in-the-middle attack Physical security Phishing

Rogue access point

Which of the following best describes Bluesnarfing? Sending anonymous electronic business cards Cloning a mobile device Executing commands on a mobile device Viewing calendar, emails, and messages on a mobile device without authorization

Viewing calendar, emails, and messages on a mobile device without authorization


Related study sets

Prep U and ATI Practice Questions - Acid-Base

View Set

CHAPTER 61 - Management of Patients with Neurologic Dysfunction

View Set

Investigation 3.2: Dichotomous Keys

View Set

Global Religions Mid term ST 2110

View Set

IL CHAPTER 3 - LIFE POLICY PROVISIONS, RIDERS, & OPTIONS

View Set