16, 17, 19 Flashcards
Which of these attacks are considered denial-of-service attacks? (Choose all that apply.) 2
A. Man-in-the-middle
B. Jamming
C. Deauthentication spoofing
D. MAC spoofing
E. Peer-to-peer
B. Jamming
C. Deauthentication spoofing
Which of these attacks would be considered malicious eavesdropping? (Choose all that apply.)
A. NetStumbler
B. Peer-to-peer
C. Protocol analyzer capture
D. Packet reconstruction
E. PS-Poll floods
C. Protocol analyzer capture
D. Packet reconstruction
Which of these attacks will not be detected by a wireless intrusion prevention system (WIPS)?
A. Deauthentication spoofing
B. MAC spoofing
C. Rogue access point
D. Eavesdropping with a protocol analyzer
E. Association flood
D. Eavesdropping with a protocol analyzer
Which of these attacks can be mitigated with a mutual authentication solution? (Choose all that apply.)
A. Malicious eavesdropping
B. Deauthentication
C. Man-in-the-middle
D. Wireless hijacking
E. Authentication flood
C. Man-in-the-middle
D. Wireless hijacking
What type of security can be used to stop attackers from seeing the MAC addresses used by your legitimate 802.11 WLAN devices?
A. MAC filtering
B. CCMP/AES encryption
C. MAC spoofing
D. Rogue mitigation
E. Rogue detection
F. None of the above
F. None of the above
When you are designing a wireless policy document, what two major areas of policy should be addressed?
A. General policy
B. Functional policy
C. Rogue AP policy
D. Authentication policy
E. Physical security
A. General policy
B. Functional policy
What can happen when an intruder compromises the PSK or passphrase used during WPA/WPA2-Personal authentication? (Choose all that apply.)
A. Decryption
B. ASLEAP attack
C. Spoofing
D. Encryption cracking
E. Access to network resources
A. Decryption
E. Access to network resources
Which of these attacks are considered layer 2 DoS attacks? (Choose all that apply.) 4
A. Deauthentication spoofing
B. Jamming
C. Virtual carrier attacks
D. PS-Poll floods
E. Authentication floods
A. Deauthentication spoofing
C. Virtual carrier attacks
D. PS-Poll floods
E. Authentication floods
Jamming is not a layer 2 DoS attack.
Which of these can cause unintentional RF jamming attacks against an 802.11 wireless network? (Choose all that apply.)
A. Microwave oven
B. Signal generator
C. 2.4 GHz cordless phones
D. 900 MHz cordless phones
E. Deauthentication transmitter
A. Microwave oven
C. 2.4 GHz cordless phones
Rogue WLAN devices are commonly installed by whom? (Choose all that apply.) 3
A. Attackers
B. Wardrivers
C. Contractors
D. Visitors
E. Employees
C. Contractors
D. Visitors
E. Employees
Which two solutions help mitigate peer-to-peer attacks from other clients associated to the same 802.11 access point?
A. Personal firewall
B. WPA2 encryption
C. Client isolation
D. MAC filter
A. Personal firewall
C. Client isolation
What type of solution can be used to perform countermeasures against a rogue access point?
A. CCMP
B. PEAP
C. WIPS
D. TKIP
E. WINS
C. WIPS
A WIPS uses which four labels to classify an 802.11 device? (Choose the best four answers.)
A. Authorized
B. Neighbor
C. Enabled
D. Disabled
E. Rogue
F. Unauthorized/unknown
A. Authorized
B. Neighbor
E. Rogue
F. Unauthorized/unknown
No enable or disabled
Scott is an administrator at the Williams Lumber Company, and his WIPS has detected a rogue access point. What actions should he take after the WIPS detects the rogue AP?
(Choose the best two answers.)
A. Enable the layer 2 rogue containment feature that his WIPS provides.
B. Unplug the rogue AP from the electrical outlet upon discovery.
C. Call the police.
D. Call his mother.
E. Unplug the rogue AP from the data port upon discovery.
A. Enable the layer 2 rogue containment feature that his WIPS provides.
E. Unplug the rogue AP from the data port upon discovery.
Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.) 5
A. Wi-Fi phishing
B. Happy AP attack
C. Peer-to-peer attack
D. Malicious eavesdropping
E. 802.11 sky monkey attack
F. Man-in-the-middle attack
G. Wireless hijacking
A. Wi-Fi phishing
C. Peer-to-peer attack
D. Malicious eavesdropping
F. Man-in-the-middle attack
G. Wireless hijacking
Which two components should be mandatory in every public access wireless security policy? (Choose the best two answers.)
A. Encrypted VPN
B. 802.1X/EAP
C. Personal firewall
D. Captive portal
E. Wireless stun gun
A. Encrypted VPN
C. Personal firewall
MAC filters are typically considered to be a weak security implementation because of what type of attack?
A. Spamming
B. Spoofing
C. Phishing
D. Cracking
E. Eavesdropping
B. Spoofing
Which WIPS architecture is the most commonly deployed?
A. Integrated
B. Overlay
C. Access
D. Core
A. Integrated
Which of these encryption technologies have been cracked? (Choose all that apply.)
A. 64-bit WEP
B. 3DES
C. CCMP/AES
D. 128-bit WEP
A. 64-bit WEP
D. 128-bit WEP
What is another name for a wireless hijacking attack?
A. Wi-Fi phishing
B. Man-in-the-middle
C. Fake AP
D. Evil twin
E. AirSpy
D. Evil twin
Which WLAN security mechanisms require that each WLAN user have unique authentication credentials? (Choose all that apply.)
A. Open System
B. WPA-Personal
C. WPA2-Personal
D. WPA2-Enterprise
E. WPA3-Personal
F. WPA3-Enterprise
D. WPA2-Enterprise
F. WPA3-Enterprise
As defined by the Wi-Fi Alliance’s WPA3 security certification, which mode of operation requires the use of 256-bit Galois/Counter Mode Protocol (GCMP-256) for encryption of data?
A. WPA3-Personal only
B. WPA3-Personal transition
C. WPA3-Enterprise only
D. WPA3-Enterprise transition
E. WPA3-Enterprise 192-bit
E. WPA3-Enterprise 192-bit
128-bit WEP encryption uses a user- provided static key of what size?
A. 104 bytes
B. 64 bits
C. 124 bits
D. 128 bits
E. 104 bits
E. 104 bits
no bytes
Which three main components constitute an 802.1X authorization framework?
A. Supplicant
B. LDAP database
C. Authentication server
D. Intentional radiator
E. Authenticator
A. Supplicant
C. Authentication server
E. Authenticator