testout security pro 8.2.7 quiz practice

Ace your homework & exams now with Quizwiz!

Which type of RFID tag can send a signal over a long distance?

Active

Which of the following best describes an evil twin?

An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do?(select two. Each response is a complete solution.)

Check the MAC address of devices connected to your wire switch Conduct a site survey

Which type of interference is caused by motors, heavy machinery, and fluorescent lights?

EMI

Which type of attack is WEP extremely vulnerable to?

IV attack

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issues, you have noticed short bursts of high-intesity RF signals are interfering with your wireless network's signal. which type of attack are you most likely experiencing.

Jamming

An attacker has interrupted near-field communication (NFC) data and is using that information to masquerade as the original device. Which type of attack is being executed?

Relay

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?

Rouge access point

Which of the following best describes BlueSnarfing

Viewing calendar, emails, and messages on a mobile device without authorization

Which of the following sends unsolicited business cards and messages to a Bluetooth device.

bluejacking


Related study sets

Intro to Weather and Climate final exam chapters 9-10

View Set

Chapter 27 Activity: America at Midcentury, 1945-1961

View Set

English Composition 1 Final exam

View Set

Chapt 8 Notes, Global Enterprise, Chapter 8, Chapter 8, Global Enterprise Textbook, Chapter 6 Notes, Global Enterprise, Chapter 6, Chapter 6, Global Enterprise Textbook, Chapter 6, Global Enterprise Textbook, Part 2, Chapter 9 Notes, Global Enterpris...

View Set

Ch. 51 Care of Patients with Musculoskeletal Trauma

View Set

SIMILARITY TRANSFORMATION: DILATION

View Set