quiz 7 Flashcards

1
Q

Default accounts often have weak passwords.

A

True—Devices with default accounts such as “admin” often have weak passwords or no password at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Six characters or more constitutes a strong password.

A

False—A strong password is often classified as eight characters or more, along with other complexity requirements, although some companies stress the need for more characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privilege escalation is used in computer programs to bypass normal authentication.

A

False—Privilege escalation is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user. Backdoors are used in computer programs to bypass normal authentication and other security mechanisms in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fiber-optic cable is not susceptible to data emanations.

A

True—Fiber-optic cable is not susceptible to data emanations in the way that twisted-pair cable is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RFI is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation.

A

False—RFI is for example interference that can come from AM/FM transmissions and cell towers. EMI is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crosstalk is when a signal transmitted on one copper wire creates an undesired effect on another wire; the signal “bleeds” over, so to speak.

A

True - Crosstalk is when a signal transmitted on one copper wire creates an undesired effect on another wire; the signal “bleeds” over, so to speak. The original crosstalk dealt with phone conversations, but the term is used for data transmissions as well. W

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data emanation occurs most commonly on coaxial cable.

A

True—Data emanation occurs most commonly on coaxial cable but can also occur on twisted-pair cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One way to secure the administration interface of a WAP is to turn it off when not in use.

A

False—Turning off the WAP can make it inaccessible to client computers. It cannot change the state of the administration interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WEP is deprecated; it should be replaced with a more secure protocol, such as WPA.

A

True—WEP is an older encryption protocol for wireless networks. It should be replaced with a stronger protocol, such as WPA or WPA2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA2 has a typical key size of 128 bits.

A

False—WPA2 has a typical key size of 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following has the strongest level of encryption? 
A. WEP 
B. WAP 
C. WPA 
D. WPA2
A

D. WPA2 has the strongest level of encryption at 256 bits. WEP is weak, deprecated, and should be replaced. WAP stands for wireless access point. WPA2 is stronger than WPA and should be used if possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is not a good strategy for securing a WAP? 
A. NAT filtering 
B. Turn off the SSID 
C. Place it in a Faraday cage 
D. Use PNAC
A

C. If a WAP is placed in a Faraday cage, no clients can access it! However, using NAT filtering, disabling the SSID, and using PNAC are all ways to secure the WAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A person searches for wireless networks from their car. What is this an example of? 
A. Wardriving 
B. DDoS 
C. Replay attack 
D. Bluejacking
A

. A. Wardriving is the act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna. DDoS and replays are network attacks. Bluejacking is the sending of unsolicited messages to a Bluetooth-enabled phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is the unauthorized access of information from a wireless device through a Bluetooth connection? 
A. Bluejacking 
B. Bluesnarfing 
C. Bluebeard 
D. The blues
A

B. Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection. Bluejacking is the sending of unsolicited messages to a Bluetooth-enabled phone. Bluebeard and the blues do not have to do with wireless technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What should you configure to improve wireless security? 
A. Enable the SSID. 
B. IP spoofing. 
C. Remove repeaters. 
D. MAC filtering.
A

D. MAC filtering disallows connections from any wireless clients unless the wireless client’s MAC address is on the MAC filtering list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following should be modified because it is weak by default? 
A. Default account 
B. NAT firewall 
C. Wireless encryption 
D. PNAC
A

A. The default account should be modified; often, it has a weak password or no password at all. NAT firewalls need to be enabled to work as does wireless encryption and PNAC.

17
Q
Which of the following is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user? 
A. Backdoor 
B. Privilege escalation 
C. Weak password 
D. DDoS
A

B. Privilege escalation is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user.

18
Q
Which of the following cable types can be susceptible to crosstalk? (Select the two best answers.) 
A. Fiber-optic 
B. Twisted-pair 
C. Coaxial 
D. Data emanation Which of the following
A

. B and C. Twisted-pair cable and coaxial cables are both susceptible to crosstalk. Fiber-optic is not, and data emanation is the electromagnetic (EM) field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.

19
Q
The act of splitting the wires of a twisted-pair cable connection would be an example of which of the following? 
A. Wardriving 
B. Data emanation 
C. Wiretapping 
D. Spectral analyzing
A

C. Wiretapping is the act of splitting the wires of a twisted-pair cable connection to eavesdrop or steal data.

20
Q
You find a rogue access point on your network. What should you do with it? (Select the best answer.) 
A. Remove it. 
B. Disable the SSID. 
C. Use strong encryption. 
D. Use PNAC.
A

A. If a rogue access point is found, it should be removed. The other options are possibilities if the WAP needs to be used later, but more often than not, it should be removed.