Deck 8: Wireless Network Security

Full screen (f)
exit full mode
Question
For IEEE WLANs,the maximum transmit power is 200 milliwatts (mW).
Use Space or
up arrow
down arrow
to flip the card.
Question
RFID is commonly used to transmit information between networked computers.
Question
Near field communication (NFC)is a set of standards used to establish communication between devices in very close proximity.
Question
Bluetooth is an example of what type of technology below?

A)Small Area Network
B)Private Area Network
C)Personal Area Network
D)Limited Area Network
Question
In a bluesnooping attack,the attacker copies emails,calendars,contact lists,cell phone pictures,or videos by connecting to the Bluetooth device without the owner's knowledge or permission.
Question
Wired Equivalent Privacy (WEP)is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
Question
RF signals can be picked up from an open or mis-configured AP.
Question
In ad hoc mode,devices can only communicate between themselves and cannot connect to another network.
Question
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?

A)Bluejacking
B)Bluecracking
C)Bluesnarfing
D)Bluetalking
Question
Piconets in which connections exist between different piconets are known as which of the following terms?

A)broadnet
B)honeynet
C)boundnet
D)scatternet
Question
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

A)active twin
B)authorized twin
C)internal replica
D)evil twin
Question
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
Question
What device acts like a wireless base station in a network,acting as a bridge between wireless and wired networks?

A)access Point
B)endpoint
C)WMM
D)ad-hoc peer
Question
RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.
Question
The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.
Question
What is the maximum range of most Bluetooth 5 devices?

A)200 ft
B)60 meters
C)150 meters
D)800 ft
Question
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

A)random
B)sanctioned
C)rogue
D)legitimate
Question
Slave devices that are connected to a piconet and are sending transmissions are known as what?

A)active slave
B)passive slaves
C)parked slaves
D)neutral slaves
Question
The current Bluetooth version is Bluetooth 6.
Question
What type of radio frequency transmissions are used by Bluetooth devices?

A)single-range radio
B)long-range radio
C)short-range radio
D)ultra-short-range radio
Question
Where does the supplicant send identity information?

A)client
B)second supplicant
C)authenticator
D)certificate authority
Question
Which of the following is the most secure form of IEEE 802.1x authentication?

A)approved authentication
B)authenticator-based authentication
C)spectrum-based authentication
D)certificate-based authentication
Question
The Temporal Key Integrity Protocol (TKIP)encryption technology uses a MIC value that is what length?

A)24 bits
B)32 bits
C)48 bits
D)64 bits
Question
Which option below is responsible for the issuing of EAP request packets?

A)supplicant
B)authenticator
C)authentication server
D)proxy
Question
Which of the following choices is not one of the four types of packets used by EAP?

A)Request
B)Response
C)Success
D)Error
Question
Which direction do access point antennas radiate their signals and where should they be located?

A)two direction and centrally located
B)four directions and asymmetrically located
C)all directions and asymmetrically located
D)all directions and centrally located
Question
Which encryption protocol below is used in the WPA2 standard?

A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
Question
What is the maximum transmission power for IEEE WLANs?

A)100 milliwatts (mW)
B)200 milliwatts (mW)
C)400 milliwatts (mW)
D)500 milliwatts (mW)
Question
What is the maximum number of characters that can exist within a SSID name?

A)10
B)12
C)26
D)32
Question
What encryption protocol is used for WPA2?

A)TKIP
B)TKIP MIC
C)CCMP
D)CBC-MAC
Question
Which EAP protocol creates an encrypted channel between the client authentication server and the client,and uses Microsoft Windows logins and passwords?

A)TKIP
B)LEAP
C)PEAP
D)ICMP
Question
What technology uses a standard web browser to provide information,and gives the wireless user the opportunity to agree to a policy or present valid login credentials,providing a higher degree of security?

A)captive portal AP
B)gateway access point
C)wireless device probe
D)AUP access point
Question
What type of survey can help a network administrator make decisions about bands,channels,and widths when installing new access points?

A)wireless
B)site
C)frequency
D)architectural
Question
When using AES-CCMP,the AES-256 bit key requires how many rounds?

A)4
B)10
C)13
D)15
Question
Which of the following self-contained APs are autonomous,or independent,because they are separate from other network devices and even other autonomous APs?

A)fat APs
B)single APs
C)thin APs
D)super APs
Question
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.

A)EAP-MSCHAPv2
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
Question
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?

A)access point probe
B)dedicated probe
C)WAP
D)wireless device probe
Question
Select the EAP protocol that uses digital certificates for authentication?

A)EAP-MSCHAPv3
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
Question
Authentication for WPA Personal is accomplished by using what type of key?

A)IV
B)PSK
C)TKIP
D)MIC
Question
What specific feature on an AP controls how much of the spectrum is available to transfer data?

A)channel width
B)channel variance
C)channel selection
D)channel frequency limit
Question
Describe a piconet.
Question
What is the most common type of wireless access control?
Question
What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?
Question
Discuss how to prevent bluesnarfing.
Question
Explain why it is important to be able to control the power level at which the WLAN transmits.
Question
List and describe the major parts of an access point.
Question
What is the Message Integrity Check (MIC)within WPA used for?
Question
What are the four types of packets used by EAP?
Question
How does the WPA Temporal Key Integrity Protocol encryption technology operate?
Question
Discuss the different types of interference one might encounter using wireless devices.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Wireless Network Security
1
For IEEE WLANs,the maximum transmit power is 200 milliwatts (mW).
True
2
RFID is commonly used to transmit information between networked computers.
False
3
Near field communication (NFC)is a set of standards used to establish communication between devices in very close proximity.
True
4
Bluetooth is an example of what type of technology below?

A)Small Area Network
B)Private Area Network
C)Personal Area Network
D)Limited Area Network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In a bluesnooping attack,the attacker copies emails,calendars,contact lists,cell phone pictures,or videos by connecting to the Bluetooth device without the owner's knowledge or permission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Wired Equivalent Privacy (WEP)is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
RF signals can be picked up from an open or mis-configured AP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In ad hoc mode,devices can only communicate between themselves and cannot connect to another network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?

A)Bluejacking
B)Bluecracking
C)Bluesnarfing
D)Bluetalking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Piconets in which connections exist between different piconets are known as which of the following terms?

A)broadnet
B)honeynet
C)boundnet
D)scatternet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

A)active twin
B)authorized twin
C)internal replica
D)evil twin
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What device acts like a wireless base station in a network,acting as a bridge between wireless and wired networks?

A)access Point
B)endpoint
C)WMM
D)ad-hoc peer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What is the maximum range of most Bluetooth 5 devices?

A)200 ft
B)60 meters
C)150 meters
D)800 ft
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

A)random
B)sanctioned
C)rogue
D)legitimate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Slave devices that are connected to a piconet and are sending transmissions are known as what?

A)active slave
B)passive slaves
C)parked slaves
D)neutral slaves
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The current Bluetooth version is Bluetooth 6.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What type of radio frequency transmissions are used by Bluetooth devices?

A)single-range radio
B)long-range radio
C)short-range radio
D)ultra-short-range radio
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Where does the supplicant send identity information?

A)client
B)second supplicant
C)authenticator
D)certificate authority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is the most secure form of IEEE 802.1x authentication?

A)approved authentication
B)authenticator-based authentication
C)spectrum-based authentication
D)certificate-based authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The Temporal Key Integrity Protocol (TKIP)encryption technology uses a MIC value that is what length?

A)24 bits
B)32 bits
C)48 bits
D)64 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which option below is responsible for the issuing of EAP request packets?

A)supplicant
B)authenticator
C)authentication server
D)proxy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following choices is not one of the four types of packets used by EAP?

A)Request
B)Response
C)Success
D)Error
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which direction do access point antennas radiate their signals and where should they be located?

A)two direction and centrally located
B)four directions and asymmetrically located
C)all directions and asymmetrically located
D)all directions and centrally located
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Which encryption protocol below is used in the WPA2 standard?

A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What is the maximum transmission power for IEEE WLANs?

A)100 milliwatts (mW)
B)200 milliwatts (mW)
C)400 milliwatts (mW)
D)500 milliwatts (mW)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
What is the maximum number of characters that can exist within a SSID name?

A)10
B)12
C)26
D)32
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What encryption protocol is used for WPA2?

A)TKIP
B)TKIP MIC
C)CCMP
D)CBC-MAC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which EAP protocol creates an encrypted channel between the client authentication server and the client,and uses Microsoft Windows logins and passwords?

A)TKIP
B)LEAP
C)PEAP
D)ICMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What technology uses a standard web browser to provide information,and gives the wireless user the opportunity to agree to a policy or present valid login credentials,providing a higher degree of security?

A)captive portal AP
B)gateway access point
C)wireless device probe
D)AUP access point
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What type of survey can help a network administrator make decisions about bands,channels,and widths when installing new access points?

A)wireless
B)site
C)frequency
D)architectural
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
When using AES-CCMP,the AES-256 bit key requires how many rounds?

A)4
B)10
C)13
D)15
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following self-contained APs are autonomous,or independent,because they are separate from other network devices and even other autonomous APs?

A)fat APs
B)single APs
C)thin APs
D)super APs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.

A)EAP-MSCHAPv2
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?

A)access point probe
B)dedicated probe
C)WAP
D)wireless device probe
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Select the EAP protocol that uses digital certificates for authentication?

A)EAP-MSCHAPv3
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Authentication for WPA Personal is accomplished by using what type of key?

A)IV
B)PSK
C)TKIP
D)MIC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What specific feature on an AP controls how much of the spectrum is available to transfer data?

A)channel width
B)channel variance
C)channel selection
D)channel frequency limit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe a piconet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the most common type of wireless access control?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss how to prevent bluesnarfing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain why it is important to be able to control the power level at which the WLAN transmits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and describe the major parts of an access point.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the Message Integrity Check (MIC)within WPA used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are the four types of packets used by EAP?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does the WPA Temporal Key Integrity Protocol encryption technology operate?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss the different types of interference one might encounter using wireless devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.