Review 13 Flashcards
(16 cards)
Which of the following protocols was jointly developed by Cisco, Microsoft, and RSA?
Question options:
EAP
REAP
PEAP
LEAP
PEAP
Which of the following features does WPA2 supply on a wireless network?
Question options:
Network identification
Encryption
Client-connection refusal based on MAC address
Decentralized access points for clients
Network identification
Which of the following statements is NOT true regarding SSIDs?
Question options:
The name of an access point must be the same as the SSID.
Experts say that turning off SSID broadcasting can actually make a wireless LAN more vulnerable to attack.
Although an SSID is necessary for a secure network, on its own, it doesn’t do much to make a network more secure.
Each SSID can be a maximum of 32 characters
The name of an access point must be the same as the SSID
Which technology is used by the 802.11ac standard to increase network bandwidth?
Question options:
40 MHz bonded channels
Four streams
Data compression
Eight streams
Eight streams
Which of the following Bluetooth hacking attacks is the act of sending unwanted data to Bluetooth devices that are enabled and discoverable?
Question options:
Bluejacking
Bluebugging
BlueSmacking
Bluesnarfing
Bluejacking
Which of the following protocols was developed by Cisco and uses dynamic WEP keys?
Question options:
EAP
REAP
LEAP
PEAP
LEAP
Which of the following is a GPS mapping tool?
Question options:
inSSIDer Plus
WeFi
WiFi Explorer
Wireshark
WeFi
What was the original encryption protection mechanism developed for wireless networks?
Question options:
WP2
EAP
WPA
WEP
WEP
Which of the following Bluetooth hacking attacks exploits a Bluetooth device to install a backdoor that bypasses normal authentication, giving full access to the device?
Question options:
Bluesnarfing
BlueSmacking
Bluebugging
Bluejacking
Bluebugging
Which wireless connection type allows you to connect an internet-capable device to the internet through a wireless, portable device, such as a phone?
Question options:
Infrastructure network
Ad-Hoc network
Lan-to-Lan network
Hotspot network
Hotspot network
What is the most common type of wireless antenna, especially among radios and older TVs?
Question options:
Dipole
Yagi
Parabolic
Tripole
Dipole
Which of the following is a Bluetooth security countermeasure?
Question options:
Enable MAC address filtering.
Use a pre-shared key.
Use a Bluetooth firewall on Android devices.
Disable Bluetooth SSID broadcasting.
Use a Bluetooth firewall on Android devices.
Which type of wireless attack could be accomplished by hiding a Raspberry access point in a target location?
Question options:
Wardriving
Rogue Access Points
Jamming Attacks
Ad Hoc Networks
Rogue Access Points
Which of the following is NOT a WPA/WPA2 Cracking Countermeasure?
Question options:
Network Access Control (NAC)
Virtual Private Networks (VPNs)
Passphrase protection
Server-level protections
Server-level protections
Which of the following statements is true?
Question options:
The iOS operating system covers all five core areas of the mobile security model.
iOS is an open-source platform
iOS is more secure
The lower-level workings of iOS are well documented.
iOS is more secure
Which of the following statements is NOT true regarding “software-based” wireless access points.
Question options:
I can serve as a bridge between two wireless clients.
It can be configured to work as a wireless client.
It is also known as “virtual Wi-Fi”.
It can function as an access point.
I can serve as a bridge between two wireless clients.