Chapter 8 Securing Network Media and Devices Review Flashcards

1
Q

Which of the following is the most secure protocol to use when accessing a wireless network?

A. WEP
B. WPA
C. WPA2
D. TKIP

A

C. WPA2

Wi-Fi Protected Access 2 is the most secure protocol listed for connecting to wireless networks. It is more secure than WPA and WEP. Wired Equivalent Privacy (WEP) is actually a deprecated protocol that should be avoided. The WEP algorithm is considered deficient for encrypted wireless networks. TKIP is also deprecated and is replaceable with CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the unauthorized access of information from a Bluetooth device?

A. Bluejacking
B. Bluesnarfing
C. Deep Blue
D. The Blues Brothers

A

B. Bluesnarfing

Bluesnarfing is the unauthorized access of information from a Bluetooth device-for example, calendar, information, phonebook contacts, and so on.
Bluejacking is the sending of unsolicited messages to Bluetooth enabled devices. The other two aren’t relevant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You scan your network and find a rogue access point with the same SSID used by your network. What type of attack is occurring?

A. War-driving
B. Bluesnarfing
C. Evil Twin
D. IV attack

A

C. Evil Twin

An evil twin is a rogue access pint that has the same SSID as another access point on the network. War-driving is when a person attempts to access wireless network, usually while driving in a vehicle. An IV attack is one that attempts to break the encryption of wireless protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an unauthorized wireless router that allows access to a secure network?

A. Rogue Access Point
B. Evil Twin
C. War-driving
D. AP isolation

A

A. Rogue Access Point

A rogue access point is an unauthorized wireless router that allows access to a secure network. An evil twin is a type of rogue AP, but it also uses the same SSID as the legitimate network. AP isolation blocks each wireless user from communicating with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly