Chapter 8 Flashcards

Combo: Quiz 8 plus Book End of Chapter Questions

1
Q

Which technology is predominately used for contactless payment systems?

a. Near field communication (NFC)
b. Wireless local area network (WLAN)
c. Bluetooth
d. Radio Frequency ID (RFID)

A

a. Near field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?

a. Bluesnarfing
b. Bluejacking
c. Bluecreeping
d. Bluestealing

A

a. Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a difference between NFC and RFID?

a. NFC is based on wireless technology while RFID is not.
b. RFID is faster than NFC.
c. RFID is designed for paper-based tags while NFC is not.
d. NFC devices cannot pair as quickly as RFID devices.

A

c. RFID is designed for paper-based tags while NFC is not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of these technologies is NOT found in a wireless router?

a. Access point
b. Router
c. Dynamic host configuration protocol (DHCP) server
d. Firewall

A

a. Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is a rogue AP a security vulnerability?

a. It uses the weaker IEEE 80211i protocol.
b. It conflicts with other network firewalls and can cause them to become disabled.
c. It allows an attacker to bypass network security configurations.
d. It requires the use of vulnerable wireless probes on all mobile devices.

A

c. It allows an attacker to bypass network security configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these is NOT a risk when a home wireless router is not securely configured?

a. Only a small percentage of the total traffic can be encrypted.
b. An attacker can steal data from any folder with file sharing enabled.
c. User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.
d. Malware can be injected into a computer connected to the WLAN.

A

a. Only a small percentage of the total traffic can be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these Wi-Fi Protected Setup
(WPS) methods is vulnerable?

a. Push-button method
b. PIN method
c. Piconet method
d. NFC method

A

b. PIN method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Flavio visits a local coffee shop on his
way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?

a. Captive portal
b. Web-based portal
c. Rogue portal
d. Authenticated portal

A

a. Captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is NOT a wireless peripheral protection option?

a. Update or replacing any vulnerable device
b. Switch to a more fully tested Bluetooth model
c. Install a network sensor to detect an attack
d. Substitute a wired device

A

c. Install a network sensor to detect an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The primary design of a(n) _____ is to capture the transmissions from legitimate users.

a. rogue access point
b. WEP
c. evil twin
d. Bluetooth grabber

A

c. evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is a vulnerability of MAC address filtering?

a. APs use IP addresses instead of MACs.
b. The user must enter the MAC.
c. MAC addresses are initially exchanged unencrypted.
d. Not all operating systems support MACs.

A

c. MAC addresses are initially exchanged unencrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is NOT a limitation of
turning off the SSID broadcast from an AP?

a. Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.
b. Some versions of operating systems favor a network that broadcasts an SSID over one that does not.
c. Users can more easily roam from one WLAN to another.
d. The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.

A

c. Users can more easily roam from one WLAN to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary weakness of wired equivalent privacy (WEP)?

a. It functions only on specific brands of APs.
b. Its usage creates a detectable pattern.
c. It slows down a WLAN from 104 Mbpsto 16 Mbps.
d. Initialization vectors (IVs) are difficult
for users to manage.

A

b. Its usage creates a detectable pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA replaces WEP with _____.

a. WPA2
b. Temporal Key Integrity Protocol (TKIP)
c. cyclic redundancy check (CRC)
d. Message Integrity Check (MIC)

A

b. Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?

a. Frequency band
b. Channel selection
c. RFID spectrum
d. Channel width

A

c. RFID spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?

a. Controller AP
b. Standalone AP
c. Fat AP
d. Any type of AP can be managed by a
WLC.

A

a. Controller AP

17
Q

AES-CCMP is the encryption protocol
standard used in _____ .

a. WPA
b. WPA2
c. IEEE 802.11
d. NFC

A

b. WPA2

18
Q

Elijah was asked by a student intern to
explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?

a. It is the transport protocol used in TCP/IP for authentication.
b. It is a framework for transporting authentication protocols.
c. It is a subset of WPA2.
d. It is a technology used by IEEE 802.11
for encryption.

A

b. It is a framework for transporting authentication protocols.

19
Q

Minh has been asked to recommend
an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?

a. EAP-TLS
b. EAP-TTLS
c. EAP-SSL
d. EAP-FAST

A

d. EAP-FAST

20
Q

Which of these is NOT a type of wireless AP probe?

a. Wireless device probe
b. WNIC probe
c. Dedicated probe
d. AP probe

A

b. WNIC probe

21
Q

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

a) random
b) sanctioned
c) rogue
d) legitimate

A

c) rogue

22
Q

RF signals can be picked up from an open or mis-configured AP.

(T/F)

A

True

23
Q

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?

a) Access Point
b) Endpoint
c) WMM
d) Ad-hoc peer

A

a) Access Point

24
Q

RF signal “noise” that creates interference and prevents communications from occurring is called signal blocking.

(T/F)

A

False

25
Q

Which option below is responsible for the issuing of EAP request packets?

A

authenticator

26
Q

Slave devices that are connected to a piconet and are sending transmissions are known as what?

A

Active slave

27
Q

Authentication for WPA Personal is accomplished by using what type of key?

A

PSK

28
Q

Why is controlling the power setting of WLAN good security?

A

Limits range of signal so hackers can get access to signal

29
Q

What is the most common access control

A

MAC