Chapter 8 Quiz

11 September 2022
4.7 (114 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?
answer
Bluesnarfing
question
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
answer
rogue
question
Authentication for WPA Personal is accomplished by using what type of key?
answer
PSK
question
Bluetooth is an example of what type of technology below?
answer
Personal Area Network
question
For IEEE WLANs, the maximum transmit power is 200 milliwatts (mW). T/F
answer
True
question
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner's knowledge or permission. T/F
answer
False
question
In ad hoc mode, devices can only communicate between themselves and cannot connect to another network. T/F
answer
True
question
Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity. T/F
answer
True
question
Piconets in which connections exist between different piconets are known as which of the following terms?
answer
scatternet
question
RFID is commonly used to transmit information between networked computers. T/F
answer
False
question
RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking. T/F
answer
False
question
RF signals can be picked up from an open or mis-configured AP. T/F
answer
True
question
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
answer
WAP
question
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.
answer
EAP-FAST
question
Select the EAP protocol that uses digital certificates for authentication?
answer
EAP-TLS
question
Slave devices that are connected to a piconet and are sending transmissions are known as what?
answer
active slave
question
The current Bluetooth version is Bluetooth 6. T/F
answer
False
question
The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured. T/F
answer
False
question
The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length?
answer
64 bits
question
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
answer
access Point
question
What encryption protocol is used for WPA2?
answer
CCMP
question
What is the maximum number of characters that can exist within a SSID name?
answer
32
question
What is the maximum range of most Bluetooth 5 devices?
answer
800 ft
question
What is the maximum transmission power for IEEE WLANs?
answer
200 milliwatts (mW)
question
What specific feature on an AP controls how much of the spectrum is available to transfer data?
answer
channel width
question
What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security?
answer
captive portal AP
question
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
answer
Bluejacking
question
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
answer
evil twin
question
What type of radio frequency transmissions are used by Bluetooth devices?
answer
short-range radio
question
What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points?
answer
site
question
When using AES-CCMP, the AES-256 bit key requires how many rounds?
answer
13
question
Where does the supplicant send identity information?
answer
authenticator
question
Which direction do access point antennas radiate their signals and where should they be located?
answer
all directions and centrally located
question
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?
answer
PEAP
question
Which encryption protocol below is used in the WPA2 standard?
answer
AES-CCMP
question
Which of the following choices is not one of the four types of packets used by EAP?
answer
Error
question
Which of the following is the most secure form of IEEE 802.1x authentication?
answer
certificate-based authentication
question
Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices and even other autonomous APs?
answer
fat APs
question
Which option below is responsible for the issuing of EAP request packets?
answer
authenticator
question
Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. T/F
answer
True