Module 11 Flashcards

1
Q

Which of these is a vulnerability of MAC address filtering in a WLAN?

  • The user must enter the MAC.
  • Not all operating systems support MACs.
  • MAC addresses are initially exchanged unencrypted.
  • APs use IP addresses instead of MACs.
A

-MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. Attackers monitoring the airwaves could easily see the MAC address of an approved device and then substitute it on their own device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?

  • EAP-FAST
  • EAP-TTLS
  • EAP-TLS
  • EAP-SSL
A

EAP-FAST
Correct. This protocol securely tunnels any credential form for authentication (such as a password or a token) using TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Imani has been asked to purchase wireless LAN controllers (WLCs) for the office. What type of APs must she also purchase that can be managed by a WLC?

  • Any type of AP can be managed by a WLC
  • Standalone AP
  • Fat AP
  • Controller AP
A

Controller AP
Correct. Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is the single device that can be configured, and then these settings are automatically distributed to all controller APs (a remote office WLAN controller is used to manage multiple WLCs at remote sites from a central location).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nyla is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?

  • Bluesnarfing
  • Blueswiping
  • Bluejacking
  • Bluestealing
A

Correct. Bluesnarfing is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection. In a bluesnarfing attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Aaliyah has been asked to do research in a new payment system for the retail stores that her company owns. Which technology is predominately used for contactless payment systems that she will investigate?

  • Bluetooth
  • Near field communication (NFC)
  • Wi-Fi
  • Radio frequency ID (RFID)
A

-Near field communication (NFC)

Consumer NFC devices are most often used as an alternative to using cash or a credit card as a payment method and are called contactless payment systems. Users store payment card numbers in a “virtual wallet” on a watch or smartphone to pay for purchases at an NFC-enabled PoS checkout device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are jamming attacks generally rare?

  • They can’t get around new IEEE amendments that fully protect WLANs
  • They can’t identify WLAN RF signals from other device signals
  • The transmitter is not very powerful and must be close to the target
  • They require expensive, sophisticated equipment
A

-They require expensive, sophisticated equipment

Correct. Jamming attacks generally are rare because sophisticated and expensive equipment is necessary to flood the RF spectrum with enough interference to impact the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Under which vulnerability can an attacker steal information from a user’s phone using a device to connect to the phone without physically touching it?

  • Man-in-the-middle
  • Data theft
  • Eavesdropping
  • Device theft
A

-Data theft

Correct. In data theft, attackers use NFC to connect a portable reader to a user’s smartphone in a crowd to steal payment information stored on the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security?

  • WPS
  • WEP
  • MAC
  • WPA
A

MAC

The media access control address (MAC) is a hardware address that uniquely identifies each network node. It is a unique 48-bit number “burned” into the network interface card adapter when it is manufactured. MAC filtering is a security measure to prevent unwanted network access by hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sam is asked to help his company design a wireless network for their new location.

Which of the following protocols has the strongest wireless security, supports a longer bit of encryption, and improved interaction capabilities with the internet of things (IoT) devices?

  • WEP
  • WPA
  • WPA3
  • WPA2
A

WPA3

Correct. WPA3 aims to deliver a suite of features to simplify security configuration for users while enhancing network security protections. The WPA3 SAE is designed to increase security at the handshake when keys are being exchanged. The result is that WPA3 can give stronger security even if short or weak passwords are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of APs can be managed by wireless LAN controllers (WLCs)?

  • Controller AP
  • Captive portal APs
  • Fat AP
  • Standalone APs
A

Correct. Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is a single device that can be configured and then used to automatically distribute the settings to all controller APs. A remote office WLAN controller manages multiple WLCs at remote sites from a central location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?

  • Evil twin
  • Wireless denial of service attacks
  • Rogue access point
  • Intercepting wireless data
A

Correct. An evil twin is designed to mimic an authorized access point (AP) so that a user’s mobile device, such as a laptop or tablet, unknowingly connects to the evil twin instead. Attackers can then capture the transmissions from users to the evil twin access point (AP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long battery life, high connection density, and has a low-power wide-area network?

  • Narrowband IoT
  • Cellular IoT baseband
  • Subscriber identity module
  • Zigbee
A

Correct. The narrowband internet of things (NB-IoT) is a low-power wide-area network (LPWAN) radio technology standard. NB-IoT is a wide-range cellular service that focuses on indoor coverage, low cost, long battery life, and high connection density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must provide an internet connection as an access point, mirror a smartphone screen on the LED dash display, and have a hands-free system where drivers can use voice controls to browse their phone’s contact list, make and receive hands-free phone calls, and use navigation apps.

Which technology should he use and why?

  • Bluetooth, because it can be used to pair devices, allowing for hands-free and screen mirroring features.
  • WLAN, because it can be connected to the car’s internal computer system to provide internet and screen mirroring features.
  • RFID devices, because they establish two-way communication between devices, which can be used to provide hands-free features with voice control.
  • NFC, because it is used to transmit information between devices by a small tag that can help provide hands-free features and an internet connection.
A

Correct. Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing for rapid “on-the-fly” connections between Bluetooth-enabled devices. Bluetooth provides the ability to mirror screens, use voice controls, and access the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate the IoT device?

  • Zigbee
  • Narrowband IoT
  • Subscriber identity module
  • Cellular IoT baseband
A
Correct. A **SIM** card is an integrated circuit that securely stores information used to identify and
authenticate the IoT device on a cellular network like 5G. Some IoT devices use a SIM card (subscriber identity module card) for data transmissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so?

  • A WDoS attack, because WLANs are less secure and can easily be hacked.
  • A disassociation attack, because the device gets disconnected from the network and can be hacked easily.
  • A WLAN consumer attack, because many users fail to properly configure security on their home WLANs.
  • A jamming attack, because this attack can be achieved using mobile phone networks.
A

Correct. Attacks against consumers’ home WLANs are considered easy because many users fail to properly configure security on their home wireless networks. Attackers access insecure wireless networks for multiple reasons, including to steal data, read wireless transmissions, and inject malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?

  • Frequency band
  • Channel width
  • Channel selection
  • RFID spectrum
A

Correct. RFIDs do not have APs, but rather they are found on Wi-Fi networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

  • Push-button method
  • PIN method
  • Click-to-connect method
  • Piconet method
A

Correct. There are significant design and implementation flaws in WPS using the PIN method.

18
Q

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered?

  • Rogue portal
  • Authenticated portal
  • Control portal
  • Captive portal
A

Correct. A captive portal AP uses a standard web browser to provide information and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security

19
Q

Which site survey tool is used to visually represent wireless network details such as channel bandwidth, channel coverage, data rate, and interference, among others?

-Channel selection
Heat maps
-Channel overlays
-Wi-Fi analyzers

A

Correct. A Wi-Fi analyzer helps to visualize essential details of the wireless network. An analyzer can provide information such as signal strength, network health, channel bandwidth, channel coverage, data rate, and interference (noise).

20
Q

In which of the following attacks do attackers use intentional interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP?

  • Wireless denial of service attacks
  • Evil twin
  • Disassociation attack
  • Intercepting wireless data
A

Correct. In wireless denial of service (DoS) attacks, which are also referred to as jamming, the attacker can use intentional radio frequency (RF) interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP. This attack prevents the transmission of data to or from network devices.

21
Q

Zara has been instructed to organize an event where top companies will come and give a webinar. Since the event is large and the number of people attending is substantial, Zara needs to ensure that there are no disturbances. She thinks preventing devices from communicating and calls from being made or received is the easiest solution.

Which factor should Zara use to achieve this?

  • Rogue access point
  • Jamming
  • Evil twin
  • Disassociation
A

Correct. Jamming prevents the transmission of data to or from network devices by intentionally flooding the RF spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring.

22
Q

Melvin is moving his small business from his basement to an office building now that he has five full-time employees. What type of enterprise AP should he choose when setting up the new office’s WLAN?

  • Standalone AP
  • Fat AP
  • Captive portal AP
  • Controller AP
A

Correct. Fat APs are autonomous and entirely self-contained. Their autonomous functioning makes them ideal for small offices with a handful of APs. In large enterprises or college campuses with hundreds or even thousands of APs, fat APs are not a viable option because each AP is autonomous. A single wireless network configuration change will require reconfiguring each AP individually, which can take an extended period and manpower to complete.

23
Q

Zain, a telecom engineer, plans to relocate a particular AP antenna to a new location. Which of the following configuration options will he use to adjust frequency bands, optimum channels, and available spectrum for data transfer?

  • Signal strength settings
  • Antenna placement
  • Wi-Fi analyzers
  • Spectrum selection
A

-Spectrum selection

Correct. Some access points provide the ability to adjust frequency spectrum settings such as the frequency band, channel selection, and channel width.

24
Q

Sherlin is the owner of a cosmetics store. She wanted to introduce a wireless network in the store, but her employees were against it. Sherlin ended up purchasing an inexpensive wireless router and secretly connected it to the wired network. Unfortunately, this unknowingly provided open access to the wireless signal.

What type of attack has Sherlin made her store’s network vulnerable to?

  • Rogue access point
  • Wireless denial of service attacks
  • Evil twin
  • Jamming
A

Correct. A rogue AP is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. For example, although firewalls are typically used to restrict specific attacks from entering a network, an attacker who can access the network through a rogue AP is behind the firewall.

25
Q

Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves?

  • Desktop probe
  • Wireless device probe
  • Access point probe
  • Dedicated probe
A

Correct. A dedicated probe is designed to exclusively monitor for RF transmissions. Dedicated probes only monitor the airwaves.

26
Q

What is a difference between NFC and RFID?

a. NFC is based on wireless technology while RFID is not.
b. RFID is faster than NFC.
c. RFID is designed for paper-based tags while NFC is not.
d. NFC devices cannot pair as quickly as RFID

A

a. NFC is based on wireless technology while RFID is not.

27
Q

Which technical specification of the Wi-Fi Alliance is the same as ad hoc mode in a Wi-Fi network?

a. Ad hoc II
b. Dynamic ad hoc
c. Alliance IBSS
d. Wi-Fi Direct

A

d. Wi-Fi Direct

28
Q

Fatima has just learned that employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability?

a. It uses the weaker IEEE 80211i protocol.
b. It allows an attacker to bypass network security configurations.
c. It conflicts with other network firewalls and can cause them to become disabled.
d. It requires the use of vulnerable wireless probes on all mobile devices.

A

b. It allows an attacker to bypass network security configurations.

29
Q

Which of these is NOT a risk when a home wireless router is not securely configured?

a. An attacker can steal data from any folder with file sharing enabled.
b. Wireless endpoints must be manually approved to connect to the WLAN.
c. Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.
d. Malware can be injected into a computer connected to the WLAN.

A

b. Wireless endpoints must be manually approved to connect to the WLAN.

30
Q

Which of these is a 24-bit value that changes each time a packet is encrypted and then is combined with a shared secret key?

a. RC
b. IV
c. SL
d. SSD

A

b. IV

31
Q

Which of these does not require authentication?

a. Open method
b. PSK
c. Enterprise method
d. Initialization method

A

a. Open method

32
Q

Which of the following is NOT a means by which a threat actor can perform a wireless denial of service attack?

a. Jamming
b. Disassociation
c. IEEE 802.11iw separate
d. Manipulate duration field values 343

A

c. IEEE 802.11iw separate

33
Q

Which WPA3 security feature is designed to increase security at the time of the handshake?

a. WEP
b. MIT
c. OWE
d. SAE

A

d. SAE

34
Q

Maryam is explaining the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?

a. It is the transport protocol used in TCP/IP for authentication.
b. It is a framework for transporting authentication protocols.
c. It is a subset of WPA2.
d. It is a technology used by IEEE 802.11 for encryption.

A

b. It is a framework for transporting authentication protocols.

35
Q

Zariah is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is Zariah describing?

  1. WEP-II
  2. Bluetooth grabber
  3. Rogue access point
  4. Evil twin
A
  • Evil twin
36
Q

Which of these is the encryption protocol for WPA2?

A
  • CCMP
37
Q

Shawn is approached by a medical staff team with a request to research and introduce a type of device that will help them record and transmit specific patient details.

Which technology would help the team measure and monitor blood pressure and then send those patient details from the smartphone to a phone as a message in case of emergencies?

A
  • Bluetooth
38
Q

Which of the following contains the field that indicates the function of the packet and an identifier field used to match requests and responses and the type of data being transported along with the data itself?

EAP

CCMP

DHCP

TKIP

A

An EAP packet contains a field that indicates the function of the packet (such as response or request) and an identifier field used to match requests and responses. Response and request packets also have a field that indicates the type of data being transported (such as an authentication protocol) along with the data itself.

39
Q

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection.

Which technology should Sherry suggest?

Group of answer choices

  • RFID technology can be used to connect laptop mouse without any wired connection
  • WLANs can be used to connect mobile devices to speakers
  • NFC technology can be used to connect mobile devices to speakers
  • Bluetooth technology can be used to connect devices without any wired connection
A

Bluetooth technology can be used to connect devices without any wired connection

40
Q

Which of these is the encryption protocol for WPA2?
Group of answer choices

CMAC-RSTS

CPB

CCMP

CBD-MAC

A

CCMP