Review 13 Flashcards

(16 cards)

1
Q

Which of the following protocols was jointly developed by Cisco, Microsoft, and RSA?

Question options:

EAP

REAP

PEAP

LEAP

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following features does WPA2 supply on a wireless network?

Question options:

Network identification

Encryption

Client-connection refusal based on MAC address

Decentralized access points for clients

A

Network identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements is NOT true regarding SSIDs?

Question options:

The name of an access point must be the same as the SSID.

Experts say that turning off SSID broadcasting can actually make a wireless LAN more vulnerable to attack.

Although an SSID is necessary for a secure network, on its own, it doesn’t do much to make a network more secure.

Each SSID can be a maximum of 32 characters

A

The name of an access point must be the same as the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which technology is used by the 802.11ac standard to increase network bandwidth?

Question options:

40 MHz bonded channels

Four streams

Data compression

Eight streams

A

Eight streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following Bluetooth hacking attacks is the act of sending unwanted data to Bluetooth devices that are enabled and discoverable?

Question options:

Bluejacking

Bluebugging

BlueSmacking

Bluesnarfing

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following protocols was developed by Cisco and uses dynamic WEP keys?

Question options:

EAP

REAP

LEAP

PEAP

A

LEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a GPS mapping tool?

Question options:

inSSIDer Plus

WeFi

WiFi Explorer

Wireshark

A

WeFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What was the original encryption protection mechanism developed for wireless networks?

Question options:

WP2

EAP

WPA

WEP

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following Bluetooth hacking attacks exploits a Bluetooth device to install a backdoor that bypasses normal authentication, giving full access to the device?

Question options:

Bluesnarfing

BlueSmacking

Bluebugging

Bluejacking

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which wireless connection type allows you to connect an internet-capable device to the internet through a wireless, portable device, such as a phone?

Question options:

Infrastructure network

Ad-Hoc network

Lan-to-Lan network

Hotspot network

A

Hotspot network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common type of wireless antenna, especially among radios and older TVs?

Question options:

Dipole

Yagi

Parabolic

Tripole

A

Dipole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a Bluetooth security countermeasure?

Question options:

Enable MAC address filtering.

Use a pre-shared key.

Use a Bluetooth firewall on Android devices.

Disable Bluetooth SSID broadcasting.

A

Use a Bluetooth firewall on Android devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of wireless attack could be accomplished by hiding a Raspberry access point in a target location?

Question options:

Wardriving

Rogue Access Points

Jamming Attacks

Ad Hoc Networks

A

Rogue Access Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT a WPA/WPA2 Cracking Countermeasure?

Question options:

Network Access Control (NAC)

Virtual Private Networks (VPNs)

Passphrase protection

Server-level protections

A

Server-level protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following statements is true?

Question options:

The iOS operating system covers all five core areas of the mobile security model.

iOS is an open-source platform

iOS is more secure

The lower-level workings of iOS are well documented.

A

iOS is more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements is NOT true regarding “software-based” wireless access points.

Question options:

I can serve as a bridge between two wireless clients.

It can be configured to work as a wireless client.

It is also known as “virtual Wi-Fi”.

It can function as an access point.

A

I can serve as a bridge between two wireless clients.