Chapter 7 Wireless LANs II Flashcards Preview

Networking > Chapter 7 Wireless LANs II > Flashcards

Flashcards in Chapter 7 Wireless LANs II Deck (56):
1

1) In the TJX breach, attackers first got into the network through ________.
A) spear phishing
B) an inside conspirator
C) the use of weak wireless encryption
D) all of the above

Answer: C

2

2) Wireless LAN standards come from ________.
A) OSI
B) TCP/IP
C) both A and B
D) neither A nor B

Answer: A

3

3) To drive around a city looking for working access points that are unprotected is ________.
A) drive-by hacking
B) war driving

Answer: B

4

4) Breaking into WLANs from outside the premises is ________.
A) drive-by hacking
B) war driving

Answer: A

5

5) 802.11i provides ________.
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B

Answer: C

6

6) In 802.11i, protection is provided between the client and the ________.
A) access point
B) switch
C) router
D) server

Answer: A

7

7) Which 802 working group created 802.11i?
A) 802.1
B) 802.3
C) 802.11
D) It was not an 802 working group. It was the Wi-Fi Alliance

Answer: C

8

8) Which offers stronger security?
A) WPA
B) 802.11i
C) Both A and B offer equally strong security.

Answer: B

9

9) What is the strongest security protocol for 802.11 today?
A) 802.11i
B) 802.11s
C) 802.11X
D) WPA

Answer: A

10

10) In what mode of 802.11i operation is a central authentication server used?
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B

Answer: A

11

11) In 802.11i ________, hosts must know a shared initial key.
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B

Answer: B

12

12) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key.
A) VPN
B) session
C) 802.1X
D) preshared

Answer: B

13

13) After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.
A) the preshared key
B) an 802.1X key
C) WPS keys
D) different session keys

Answer: D

14

14) For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication.
A) always use the same preshared key each time it is connected
B) always use the same session key each time it is connected
C) both A and B
D) neither A nor B

Answer: D

15

15) Session keys are used to ________.
A) make cryptanalysis more difficult
B) improve authentication
C) both A and B
D) neither A nor B

Answer: A

16

16) Which of the following is a risk in 802.11i PSK mode?
A) WPS can easily be cracked if it is used.
B) Unauthorized sharing of the pre-shared key.
C) A weak passphrase may be selected.
D) all of the above

Answer: D

17

17) In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
A) 8
B) 12
C) 20
D) 128

Answer: C

18

18) Part of WPS weakness is caused by ________.
A) 802.1X mode
B) WPA2 preshared key mode
C) dividing the 8 digit PIN into two 4 digit halves
D) IPsec

Answer: C

19

19) Which of the following has a dangerous vulnerability that is causing problems today?
A) PEAP
B) 802.11i
C) WPA
D) WPS

Answer: D

20

20) If a firm has many access points, it should use ________ mode in 802.11i.
A) PSK
B) 802.1X
C) IPsec
D) PEAP

Answer: B

21

21) The Wi-Fi Alliance calls 802.1X mode ________ mode.
A) enterprise
B) personal
C) WEP
D) WPA

Answer: A

22

22) In ________, the authenticator is the ________.
A) 802.1X, wireless access point
B) 802.11i, switch
C) 802.11i, wireless access point
D) 802.1X, central authentication server

Answer: C

23

23) 802.1X requires security between the supplicant and the authenticator in ________.
A) Ethernet
B) 802.11
C) both A and B
D) neither A nor B

Answer: B

24

24) An unauthorized internal access point is a(n) ________ access point.
A) evil twin
B) rogue
C) shadow
D) counterfeit

Answer: B

25

25) A rogue access point is created by ________.
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin

Answer: A

26

26) A rogue access point ________.
A) is an unauthorized internal access point
B) often has very poor security
C) often operates at high power
D) All of the above are true.

Answer: D

27

27) A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point

Answer: A

28

28) Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B

Answer: B

29

29) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
A) one
B) two
C) four
D) 16

Answer: B

30

30) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
A) VLANs
B) VPNs
C) PEAP
D) 802.1X mode

Answer: B

31

31) In VPNs designed to frustrate evil twin attacks, the shared secret ________.
A) is transmitted in the clear
B) is transmitted with cryptographic protections
C) is not transmitted
D) Any of the above.

Answer: C

32

32) Centralized access point management ________.
A) increases management costs but provides better control
B) reduces management costs

Answer: B

33

33) Managed access points should ________.
A) allow access point power to be adjusted remotely
B) provide constant transmission quality monitoring
C) both A and B
D) neither A nor B

Answer: C

34

34) Managed access points should ________.
A) identify rogue access points
B) be able to push updates out to access points
C) both A and B
D) neither A nor B

Answer: C

35

35) Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)2
C) Log10(P2/P1)
D) none of the above

Answer: D

36

36) An 8/1 increase in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 20
D) none of the above

Answer: D

37

37) A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 9
D) none of the above

Answer: C

38

38) A 100/1 increase in power corresponds to approximately ________ decibels.
A) 6
B) 10
C) 20
D) none of the above

Answer: C

39

39) 1 Watt represents a dBm value of about ________.
A) 10
B) 20
C) 30
D) We cannot say because only one power is given.

Answer: C

40

40) A radio that has a power of 8 mW represents a ratio of about ________ dBm.
A) 2
B) 8
C) 9
D) 10

Answer: C

41

41) I wish to have a wireless LAN to serve my house. I will use ________.
A) 802.11
B) Bluetooth
C) either A or B

Answer: A

42

42) Bluetooth is for ________.
A) large WLANs
B) cable replacement
C) both A and B
D) neither A nor B

Answer: B

43

43) Which of the following was created for PANs?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B

Answer: B

44

44) Bluetooth is standardized by the ________.
A) 802.11 Working Group
B) Wi-Fi Alliance
C) Bluetooth Special Interest Group
D) none of the above

Answer: C

45

45) Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) personal Bluetooth
D) none of the above

Answer: A

46

46) Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) enterprise Bluetooth
D) none of the above

Answer: B

47

47) Which of the following can use access points?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B

Answer: A

48

48) In Bluetooth, a master can have up to ________ slaves at any moment.
A) 1
B) 3
C) 12
D) none of the above

Answer: D

49

49) At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?
A) the Bluetooth phone
B) the Bluetooth headset
C) Both are simultaneously masters and slaves.

Answer: B

50

50) Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A) Bluetooth input profile
B) Bluetooth I/O profile
C) human interface device profile
D) none of the above

Answer: C

51

51) Near-field communication has a maximum transmission distance of about ________.
A) 400 cm/200 in
B) 40 cm/20 in
C) 4 cm/2 in
D) The devices must be physically touching.

Answer: C

52

52) In which frequency band does NFC operate?
A) 2.4 GHz
B) 5 GHz
C) both A and B
D) neither A nor B

Answer: D

53

53) Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) none of the above

Answer: D

54

54) Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) the scanning unit

Answer: D

55

55) Which of the following uses an access point?
A) traditional Wi-Fi
B) Wi-Fi Direct
C) both A and B
D) neither A nor B

Answer: A

56

56) (T/F) In NFC, an attacker several meters away cannot read the transaction.

Answer: FALSE