Chapter 9

11 September 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
Bluetooth falls under the category of _____. A) local area network (LAN) B) short area network (SAN) C) paired-device network (PDN) D) personal area network (PAN)
answer
personal area network (PAN)
question
A WEP key that is 128 bits in length _____. A) has an initialization vector (IV) that is the same length as a WEP key of 64 bits B) cannot be cracked because it is too long C) cannot be used on access points that use passphrases D) is less secure than a WEP key of 64 bits because shorter keys are stronger
answer
has an initialization vector (IV) that is the same length as a WEP key of 64 bits
question
Which of these is NOT a risk when a home wireless router is not securely configured? A) An attacker can steal data from any folder with file sharing enabled. B) Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. C) Only 50 percent of the packets will be encrypted. D) Malware can be injected into a computer connected to the WLAN.
answer
Only 50 percent of the packets will be encrypted.
question
Which of these is NOT a limitation of turning off the SSID broadcast from an AP? A) Users can more easily roam from one WLAN to another. B) The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP. C) Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another. D) Some versions of operating systems favor a network that broadcasts an SSID over one that does not.
answer
Users can more easily roam from one WLAN to another.
question
What is the unauthorized access of information from a wireless device through a Bluetooth connection called? A) bluejacking B) bluesnarfing C) Bluetooth snatching D) Bluetooth spoofing
answer
bluesnarfing
question
Which of these is NOT a type of wireless AP probe? A) wireless device probe B) WNIC probe C) dedicated probe D) AP probe
answer
WNIC probe
question
Which of these IEEE WLANs has the highest data rate? A) 802.11b B) 802.11n C) 802.11g D) 802.11ac
answer
802.11ac
question
WPA replaces WEP with _____. A) WPA2 B) Temporal Key Integrity Protocol (TKIP) C) Cyclic Redundancy Check (CRC) D) Message Integrity Check (MIC)
answer
Temporal Key Integrity Protocol (TKIP)
question
What is the Extensible Authentication Protocol (EAP)? A) a framework for transporting authentication protocols B) a subset of WPA2 C) the protocol used in TCP/IP for authentication D) a technology used by IEEE 802.11 for encryption
answer
a framework for transporting authentication protocols
question
Why is a rogue AP a security vulnerability? A) It uses the weaker IEEE 802.15.ax protocol. B) It allows an attacker to bypass many of the network security configurations. C) It requires the use of vulnerable wireless probes on all mobile devices. D) It conflicts with other network firewalls and can cause them to become disabled.
answer
It allows an attacker to bypass many of the network security configurations.
question
AES-CCMP is the encryption protocol standard used in _____. A) Bluetooth B) WPA2 C) IEEE 802.11 D) WPA
answer
WPA2
question
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? A) PIN method B) push-button method C) piconet method D) NFC method
answer
PIN method
question
Which technology is predominately used for contactless payment systems? A) wireless local area network (WLAN) B) Bluetooth C) near field communication (NFC) D) Temporal Key Integrity Protocol (TKIP)
answer
near field communication (NFC)
question
What is the primary weakness of wired equivalent privacy (WEP)? A) It functions only on specific brands of APs. B) Its usage creates a detectable pattern. C) It slows down a WLAN from 104 Mbps to 16 Mbps. D) Initialization vectors (IVs) are difficult for users to manage.
answer
Its usage creates a detectable pattern.
question
If Cora tries to access a free public Wi-Fi at a local coffee shop that requires her to first agree to an Acceptable Use Policy (AUP) before continuing, what type of AP has she encountered? A) web-based B) captive portal C) rogue D) Internet content filter
answer
captive portal
question
Which technology should be used instead of LEAP? A) STREAK B) PEAP C) LEAP-2 D) REAP
answer
PEAP
question
Which of these is a vulnerability of MAC address filtering? A) The user must enter the MAC. B) MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. C) APs use IP addresses instead of MACs. D) Not all operating systems support MACs.
answer
MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.
question
The primary design of a(n) _____ is to capture the transmissions from legitimate users. A) rogue access point B) WEP C) evil twin D) Bluetooth grabber
answer
evil twin
question
Which of these technologies is NOT found in a wireless broadband router? A) wireless probe B) firewall C) router D) access point
answer
wireless probe
question
A preshared key (PSK) of fewer than _____ characters may be subject to an attack if that key is a common dictionary word. A) 20 B) 32 C) 48 D) 64
answer
20
question
Which of the following do CCMP and TKIP NOT have in common? A) 128-bit key B) 64-bit TSC value C) 48-bit PN value sent in clear text D) 64-bit MIC value
answer
64-bit TSC value
question
APs often integrate which feature into a single hardware device? A) VPN client B) DNS C) DHCP D) RADIUS server
answer
DHCP
question
Which of the following is a security flaw in the WPS PIN method? A) There is no checksum involved B) No lockout limit C) There are only 22,000 possible values D) The PINs must all be the same
answer
No lockout limit
question
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? A) TKIP B) LEAP C) PEAP D) ICMP
answer
PEAP
question
Why would an attacker use the war driving technique? A) Create a diversion B) Search for unprotected IP phones C) Discover hidden credentials D) Identify unprotected APs
answer
Identify unprotected APs
question
Which encryption protocol below is used in the WPA2 standard? A) AES-CCMP B) AES-CTR C) AES-TKIP D) AES-SCMP
answer
AES-CCMP
question
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? A) active twin B) authorized twin C) internal replica D) evil twin
answer
evil twin
question
What is the maximum number of characters that can exist within an SSID name? A) 10 B) 12 C) 26 D) 32
answer
32
question
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? A) Gateway access point B) Captive portal access point C) Wireless device probe D) AUP Enforcement access point
answer
Captive portal access point
question
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? A) Access Point B) Endpoint C) WMM D) Ad-hoc peer
answer
Access Point