6.10 Wireless Attacks

11 September 2022
4.7 (114 reviews)
12 test answers

Unlock all answers in this set

Unlock answers (8)
question
The process of walking around an office building with an 802.11 signal detector is known as what?
answer
War Driving
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
answer
Rogue Access Point
question
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
answer
Bluejacking
question
Which of the following best describes Bluesnarfing?
answer
Unauthorized viewing calendar, emails, and messages on a mobile device
question
Which of the following describes marks that attackers place outside a building to identify an open wireless network?
answer
War chalking
question
Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?
answer
Encryption
question
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?
answer
Interference is affecting the wireless signal.
question
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?(Select two)
answer
Bluetooth AND 802.11b
question
Which of the following best describes an evil twin?
answer
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information
question
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building:....since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
answer
The wireless TV system
question
Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?
answer
Sniffing
question
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?
answer
Disable Bluetooth on the phone