Deck 8: Wireless Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: Wireless Network Security
1
For IEEE WLANs,the maximum transmit power is 200 milliwatts (mW).
True
2
RFID is commonly used to transmit information between networked computers.
False
3
Near field communication (NFC)is a set of standards used to establish communication between devices in very close proximity.
True
4
Bluetooth is an example of what type of technology below?
A)Small Area Network
B)Private Area Network
C)Personal Area Network
D)Limited Area Network
A)Small Area Network
B)Private Area Network
C)Personal Area Network
D)Limited Area Network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In a bluesnooping attack,the attacker copies emails,calendars,contact lists,cell phone pictures,or videos by connecting to the Bluetooth device without the owner's knowledge or permission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Wired Equivalent Privacy (WEP)is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
RF signals can be picked up from an open or mis-configured AP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In ad hoc mode,devices can only communicate between themselves and cannot connect to another network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?
A)Bluejacking
B)Bluecracking
C)Bluesnarfing
D)Bluetalking
A)Bluejacking
B)Bluecracking
C)Bluesnarfing
D)Bluetalking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Piconets in which connections exist between different piconets are known as which of the following terms?
A)broadnet
B)honeynet
C)boundnet
D)scatternet
A)broadnet
B)honeynet
C)boundnet
D)scatternet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
A)active twin
B)authorized twin
C)internal replica
D)evil twin
A)active twin
B)authorized twin
C)internal replica
D)evil twin
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What device acts like a wireless base station in a network,acting as a bridge between wireless and wired networks?
A)access Point
B)endpoint
C)WMM
D)ad-hoc peer
A)access Point
B)endpoint
C)WMM
D)ad-hoc peer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What is the maximum range of most Bluetooth 5 devices?
A)200 ft
B)60 meters
C)150 meters
D)800 ft
A)200 ft
B)60 meters
C)150 meters
D)800 ft
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
A)random
B)sanctioned
C)rogue
D)legitimate
A)random
B)sanctioned
C)rogue
D)legitimate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Slave devices that are connected to a piconet and are sending transmissions are known as what?
A)active slave
B)passive slaves
C)parked slaves
D)neutral slaves
A)active slave
B)passive slaves
C)parked slaves
D)neutral slaves
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The current Bluetooth version is Bluetooth 6.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What type of radio frequency transmissions are used by Bluetooth devices?
A)single-range radio
B)long-range radio
C)short-range radio
D)ultra-short-range radio
A)single-range radio
B)long-range radio
C)short-range radio
D)ultra-short-range radio
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Where does the supplicant send identity information?
A)client
B)second supplicant
C)authenticator
D)certificate authority
A)client
B)second supplicant
C)authenticator
D)certificate authority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is the most secure form of IEEE 802.1x authentication?
A)approved authentication
B)authenticator-based authentication
C)spectrum-based authentication
D)certificate-based authentication
A)approved authentication
B)authenticator-based authentication
C)spectrum-based authentication
D)certificate-based authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The Temporal Key Integrity Protocol (TKIP)encryption technology uses a MIC value that is what length?
A)24 bits
B)32 bits
C)48 bits
D)64 bits
A)24 bits
B)32 bits
C)48 bits
D)64 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which option below is responsible for the issuing of EAP request packets?
A)supplicant
B)authenticator
C)authentication server
D)proxy
A)supplicant
B)authenticator
C)authentication server
D)proxy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following choices is not one of the four types of packets used by EAP?
A)Request
B)Response
C)Success
D)Error
A)Request
B)Response
C)Success
D)Error
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which direction do access point antennas radiate their signals and where should they be located?
A)two direction and centrally located
B)four directions and asymmetrically located
C)all directions and asymmetrically located
D)all directions and centrally located
A)two direction and centrally located
B)four directions and asymmetrically located
C)all directions and asymmetrically located
D)all directions and centrally located
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Which encryption protocol below is used in the WPA2 standard?
A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What is the maximum transmission power for IEEE WLANs?
A)100 milliwatts (mW)
B)200 milliwatts (mW)
C)400 milliwatts (mW)
D)500 milliwatts (mW)
A)100 milliwatts (mW)
B)200 milliwatts (mW)
C)400 milliwatts (mW)
D)500 milliwatts (mW)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
What is the maximum number of characters that can exist within a SSID name?
A)10
B)12
C)26
D)32
A)10
B)12
C)26
D)32
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What encryption protocol is used for WPA2?
A)TKIP
B)TKIP MIC
C)CCMP
D)CBC-MAC
A)TKIP
B)TKIP MIC
C)CCMP
D)CBC-MAC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which EAP protocol creates an encrypted channel between the client authentication server and the client,and uses Microsoft Windows logins and passwords?
A)TKIP
B)LEAP
C)PEAP
D)ICMP
A)TKIP
B)LEAP
C)PEAP
D)ICMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What technology uses a standard web browser to provide information,and gives the wireless user the opportunity to agree to a policy or present valid login credentials,providing a higher degree of security?
A)captive portal AP
B)gateway access point
C)wireless device probe
D)AUP access point
A)captive portal AP
B)gateway access point
C)wireless device probe
D)AUP access point
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What type of survey can help a network administrator make decisions about bands,channels,and widths when installing new access points?
A)wireless
B)site
C)frequency
D)architectural
A)wireless
B)site
C)frequency
D)architectural
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
When using AES-CCMP,the AES-256 bit key requires how many rounds?
A)4
B)10
C)13
D)15
A)4
B)10
C)13
D)15
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following self-contained APs are autonomous,or independent,because they are separate from other network devices and even other autonomous APs?
A)fat APs
B)single APs
C)thin APs
D)super APs
A)fat APs
B)single APs
C)thin APs
D)super APs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.
A)EAP-MSCHAPv2
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
A)EAP-MSCHAPv2
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
A)access point probe
B)dedicated probe
C)WAP
D)wireless device probe
A)access point probe
B)dedicated probe
C)WAP
D)wireless device probe
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Select the EAP protocol that uses digital certificates for authentication?
A)EAP-MSCHAPv3
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
A)EAP-MSCHAPv3
B)EAP-AKA
C)EAP-FAST
D)EAP-TLS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Authentication for WPA Personal is accomplished by using what type of key?
A)IV
B)PSK
C)TKIP
D)MIC
A)IV
B)PSK
C)TKIP
D)MIC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What specific feature on an AP controls how much of the spectrum is available to transfer data?
A)channel width
B)channel variance
C)channel selection
D)channel frequency limit
A)channel width
B)channel variance
C)channel selection
D)channel frequency limit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe a piconet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the most common type of wireless access control?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss how to prevent bluesnarfing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain why it is important to be able to control the power level at which the WLAN transmits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and describe the major parts of an access point.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the Message Integrity Check (MIC)within WPA used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are the four types of packets used by EAP?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does the WPA Temporal Key Integrity Protocol encryption technology operate?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss the different types of interference one might encounter using wireless devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck