16, 17, 19 Flashcards

1
Q

Which of these attacks are considered denial-of-service attacks? (Choose all that apply.) 2

A. Man-in-the-middle
B. Jamming
C. Deauthentication spoofing
D. MAC spoofing
E. Peer-to-peer

A

B. Jamming
C. Deauthentication spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these attacks would be considered malicious eavesdropping? (Choose all that apply.)

A. NetStumbler
B. Peer-to-peer
C. Protocol analyzer capture
D. Packet reconstruction
E. PS-Poll floods

A

C. Protocol analyzer capture
D. Packet reconstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these attacks will not be detected by a wireless intrusion prevention system (WIPS)?

A. Deauthentication spoofing
B. MAC spoofing
C. Rogue access point
D. Eavesdropping with a protocol analyzer
E. Association flood

A

D. Eavesdropping with a protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of these attacks can be mitigated with a mutual authentication solution? (Choose all that apply.)

A. Malicious eavesdropping
B. Deauthentication
C. Man-in-the-middle
D. Wireless hijacking
E. Authentication flood

A

C. Man-in-the-middle
D. Wireless hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of security can be used to stop attackers from seeing the MAC addresses used by your legitimate 802.11 WLAN devices?

A. MAC filtering
B. CCMP/AES encryption
C. MAC spoofing
D. Rogue mitigation
E. Rogue detection
F. None of the above

A

F. None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When you are designing a wireless policy document, what two major areas of policy should be addressed?

A. General policy
B. Functional policy
C. Rogue AP policy
D. Authentication policy
E. Physical security

A

A. General policy
B. Functional policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can happen when an intruder compromises the PSK or passphrase used during WPA/WPA2-Personal authentication? (Choose all that apply.)

A. Decryption
B. ASLEAP attack
C. Spoofing
D. Encryption cracking
E. Access to network resources

A

A. Decryption
E. Access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these attacks are considered layer 2 DoS attacks? (Choose all that apply.) 4

A. Deauthentication spoofing
B. Jamming
C. Virtual carrier attacks
D. PS-Poll floods
E. Authentication floods

A

A. Deauthentication spoofing
C. Virtual carrier attacks
D. PS-Poll floods
E. Authentication floods

Jamming is not a layer 2 DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these can cause unintentional RF jamming attacks against an 802.11 wireless network? (Choose all that apply.)

A. Microwave oven
B. Signal generator
C. 2.4 GHz cordless phones
D. 900 MHz cordless phones
E. Deauthentication transmitter

A

A. Microwave oven
C. 2.4 GHz cordless phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue WLAN devices are commonly installed by whom? (Choose all that apply.) 3

A. Attackers
B. Wardrivers
C. Contractors
D. Visitors
E. Employees

A

C. Contractors
D. Visitors
E. Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two solutions help mitigate peer-to-peer attacks from other clients associated to the same 802.11 access point?

A. Personal firewall
B. WPA2 encryption
C. Client isolation
D. MAC filter

A

A. Personal firewall
C. Client isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of solution can be used to perform countermeasures against a rogue access point?

A. CCMP
B. PEAP
C. WIPS
D. TKIP
E. WINS

A

C. WIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A WIPS uses which four labels to classify an 802.11 device? (Choose the best four answers.)

A. Authorized
B. Neighbor
C. Enabled
D. Disabled
E. Rogue
F. Unauthorized/unknown

A

A. Authorized
B. Neighbor
E. Rogue
F. Unauthorized/unknown

No enable or disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scott is an administrator at the Williams Lumber Company, and his WIPS has detected a rogue access point. What actions should he take after the WIPS detects the rogue AP?
(Choose the best two answers.)

A. Enable the layer 2 rogue containment feature that his WIPS provides.
B. Unplug the rogue AP from the electrical outlet upon discovery.
C. Call the police.
D. Call his mother.
E. Unplug the rogue AP from the data port upon discovery.

A

A. Enable the layer 2 rogue containment feature that his WIPS provides.
E. Unplug the rogue AP from the data port upon discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.) 5

A. Wi-Fi phishing
B. Happy AP attack
C. Peer-to-peer attack
D. Malicious eavesdropping
E. 802.11 sky monkey attack
F. Man-in-the-middle attack
G. Wireless hijacking

A

A. Wi-Fi phishing
C. Peer-to-peer attack
D. Malicious eavesdropping
F. Man-in-the-middle attack
G. Wireless hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two components should be mandatory in every public access wireless security policy? (Choose the best two answers.)

A. Encrypted VPN
B. 802.1X/EAP
C. Personal firewall
D. Captive portal
E. Wireless stun gun

A

A. Encrypted VPN
C. Personal firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MAC filters are typically considered to be a weak security implementation because of what type of attack?

A. Spamming
B. Spoofing
C. Phishing
D. Cracking
E. Eavesdropping

A

B. Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which WIPS architecture is the most commonly deployed?

A. Integrated
B. Overlay
C. Access
D. Core

A

A. Integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of these encryption technologies have been cracked? (Choose all that apply.)

A. 64-bit WEP
B. 3DES
C. CCMP/AES
D. 128-bit WEP

A

A. 64-bit WEP
D. 128-bit WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is another name for a wireless hijacking attack?

A. Wi-Fi phishing
B. Man-in-the-middle
C. Fake AP
D. Evil twin
E. AirSpy

A

D. Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which WLAN security mechanisms require that each WLAN user have unique authentication credentials? (Choose all that apply.)

A. Open System
B. WPA-Personal
C. WPA2-Personal
D. WPA2-Enterprise
E. WPA3-Personal
F. WPA3-Enterprise

A

D. WPA2-Enterprise
F. WPA3-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

As defined by the Wi-Fi Alliance’s WPA3 security certification, which mode of operation requires the use of 256-bit Galois/Counter Mode Protocol (GCMP-256) for encryption of data?

A. WPA3-Personal only
B. WPA3-Personal transition
C. WPA3-Enterprise only
D. WPA3-Enterprise transition
E. WPA3-Enterprise 192-bit

A

E. WPA3-Enterprise 192-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

128-bit WEP encryption uses a user- provided static key of what size?

A. 104 bytes
B. 64 bits
C. 124 bits
D. 128 bits
E. 104 bits

A

E. 104 bits

no bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which three main components constitute an 802.1X authorization framework?

A. Supplicant
B. LDAP database
C. Authentication server
D. Intentional radiator
E. Authenticator

A

A. Supplicant
C. Authentication server
E. Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of these security methods is the replacement for PSK authentication as defined by WPA3?

A. Per-user/per-device PSK
B. Wi-Fi Protected Setup (WPS)
C. Simultaneous authentication of equals (SAE)
D. EAP-SIM
E. WPA2-Personal

A

C. Simultaneous authentication of equals (SAE)

26
Q

The ACME Company is using WPA2-Personal to secure IoT devices that are not capable of 802.1X/EAP authentication. Because an employee was recently fired, all of the company wireless IoT devices and APs had to be reconfigured with a new static 64-bit PSK. What type of WLAN security solution may have avoided this administrative headache?

A. MAC filter
B. Hidden SSID
C. Changing the default settings
D. Per-device, per-user PSK

A

D. Per-device, per-user PSK

27
Q

Which of the following encryption methods use symmetric ciphers? (Choose all that apply.) 3

A. WEP
B. TKIP
C. Public-key cryptography
D. CCMP

A

A. WEP
B. TKIP
D. CCMP

28
Q

The IEEE 802.11-2020 standard states which of the following regarding 802.11n, 802.11ac, and 802.11ax data rates and encryption? (Choose all that apply.) 2

A. WEP and TKIP must not be used.
B. CCMP and GCMP can be used.
C. WEP cannot be used; however, TKIP can be used if also using 802.1X.
D. Any encryption method defined by the standard can be used.

A

A. WEP and TKIP must not be used.
B. CCMP and GCMP can be used.

29
Q

When 802.1X/EAP security is deployed, RADIUS attributes can also be leveraged for rolebased assignment of which type of user access permissions? (Choose all that apply.)

A. Stateful firewall rules
B. Time
C. VLANS
D. ACLs
E. Bandwidth

A

A. Stateful firewall rules
B. Time
C. VLANS
D. ACLs
E. Bandwidth

30
Q

How are IPsec VPNs used to provide security in combination with 802.11 WLANs?

A. Client-based security on public access WLANs
B. Point-to-point wireless bridge links
C. Connectivity across WAN links
D. All of the above

A

D. All of the above

31
Q

When enabled, WLAN encryption provides data privacy for which portion of an 802.11 data frame?

A. MPDU
B. MSDU
C. PPDU
D. PSDU

A

B. MSDU

32
Q

Which of the following methods of authentication must occur along with the 4-Way Handshake in order to generate dynamic CCMP/AES encryption keys? (Choose all that apply.) 3

A. Shared Key authentication and 4-Way Handshake
B. 802.1X/EAP authentication and 4-Way Handshake
C. Static WEP and 4-Way Handshake
D. PSK authentication and 4-Way Handshake
E. SAE authentication and 4-Way Handshake

A

B. 802.1X/EAP authentication and 4-Way Handshake
D. PSK authentication and 4-Way Handshake
E. SAE authentication and 4-Way Handshake

no shared or static

33
Q

For an 802.1X/EAP solution to work properly, which two components must both support the same type of EAP?

A. Supplicant
B. Authorizer
C. Authenticator
D. Authentication server

A

A. Supplicant
D. Authentication server

34
Q

When you are using an 802.11 wireless controller solution, which device would usually function as the authenticator?

A. Access point
B. LDAP server
C. WLAN controller
D. RADIUS server

A

C. WLAN controller

35
Q

Which of these use cases for a per-user/per-device implementationof PSK authentication is not recommended?

A. Unique credentials for BYOD devices
B. Unique credentials for IoT devices
C. Unique credentials for guest Wi-Fi access
D. Unique credentials for legacy enterprise devices without 802.1X/EAP support
E. Unique credentials for enterprise devices with 802.1X/EAP support

A

E. Unique credentials for enterprise devices with 802.1X/EAP support

36
Q

What does successful 802.1X/EAP provide when properly implemented for WLAN security? (Choose all that apply.)

A. Access to network resources
B. Verification of access point credentials
C. Dynamic authentication
D. Dynamic encryption-key generation
E. Verification of user credentials

A

A. Access to network resources
D. Dynamic encryption-key generation
E. Verification of user credentials

37
Q

CCMP encryption uses which AES key size?

A. 192 bits
B. 64 bits
C. 256 bits
D. 128 bits

A

D. 128 bits

38
Q

Identify the security solutions that are defined by the Wi-Fi Alliance WPA2 certification. (Choose all that apply.)

A. 802.1X/EAP authentication
B. Dynamic WEP encryption
C. SAE authentication
D. PSK authentication
E. DES encryption
F. CCMP encryption

A

A. 802.1X/EAP authentication
D. PSK authentication
F. CCMP encryption

39
Q

What are some of the requirements of the optional WPA3-Enterprise 192-bit mode that is defined by the Wi-Fi Alliance?
(Choose all that apply.)

A. CCMP/AES with 128-bit encryption of data frames
B. BIP-GMAC-256 for management frame protection
C. EAP-TLS authentication protocol
D. EAP-TTLS authentication protocol
E. 256-bit GCMP/AES encryption of data frames
F. BIP-CMAC-128 for management frame protection

A

B. BIP-GMAC-256 for management frame protection
C. EAP-TLS authentication protocol
F. BIP-CMAC-128 for management frame protection

2 BIPS and TLS not TTLS

40
Q

Which layer 2 protocol is used for authentication in an 802.1X framework?

A. RSN
B. SAE
C. EAP
D. PAP
E. CHAP

A

C. EAP

41
Q

What is the maximum number of resource units that can be used for a 20 MHz OFDMA channel?

A. 2
B. 4
C. 9
D. 26
E. 52

A

C. 9

42
Q

Which type of 802.11 frame is required for either uplink MU-MIMO or uplink MUOFDMA communication?

A. Trigger
B. Probe
C. ACK
D. Beacon
E. Data

A

A. Trigger

43
Q

Which 802.11ax technology defines new power-saving capabilities that could be beneficial for IoT devices?

A. Buffer status report
B. Target wake time
C. BSS color
D. Guard interval
E. Long symbol time

A

B. Target wake time

44
Q

Which 802.11ax technology has the potential to decrease co-channel interference (CCI)? (Choose all that apply.)

A. Buffer status report
B. Target wake time
C. BSS color
D. Guard interval
E. Long symbol time
F. Spatial reuse operation

A

C. BSS color
F. Spatial reuse operation

45
Q

Which 802.11ax technology will result in higher data rates as opposed to enhanced efficiency?

A. OFDMA
B. TWT
C. 1024-QAM
D. BSS color
E. SRO

A

C. 1024-QAM

46
Q

What is the default minimum size of a resource unit if 1024-QAM modulation is used by an 802.11ax radio?

A. 26-tone
B. 52-tone
C. 106-tone
D. 242-tone
E. 484-tone

A

D. 242-tone

47
Q

Which 802.11ax technologies provide for multi-user communications?

A. OFDM
B. OFDMA
C. MIMO
D. SU-MIMO
E. MU-MIMO
F. TWT
G. SRO

A

B. OFDMA
E. MU-MIMO

48
Q

How many subcarriers (tones) are in a 20 MHz OFDMA channel?

A. 52
B. 64
C. 78
D. 256
E. 312

A

D. 256

49
Q

Which 802.11ax technology provides for mixing different QoS access categories of data when aggregating 802.11 frames?

A. OFDMA
B. Multi-TID AMPDU
C. MU-MIMO
D. TWT
E. SRO

A

B. Multi-TID AMPDU

50
Q

Which frequency bands are defined for High Efficiency (HE) wireless communications? (Choose all that apply.)

A. 1 GHz
B. 2.4 GHz
C. 5 GHz
D. 6 GHz
E. 60 GHz

A

B. 2.4 GHz
C. 5 GHz
D. 6 GHz

51
Q

Which multi-user technology is considered optional by the Wi-Fi Alliance? (Choose all that apply.)

A. Downlink OFDMA
B. Uplink OFDMA
C. Downlink MU-MIMO
D. Uplink MU-MIMO

A

D. Uplink MU-MIMO

52
Q

When either DL-OFDMA or UL-OFDMA is employed, what is the purpose of a Wi-Fi 6 AP sending a multi-user request-to-send (MU-RTS) frame? (Choose all that apply.)

A. Reserve the RF medium
B. Contend for the RF medium
C. Resource unit allocation
D. Scheduled TWT
E. Intra-BSS deferral

A

A. Reserve the RF medium

53
Q

Which of these 802.11ax PPDU formats is used for trigger frames?

A. HE SU
B. HE MU
C. HE ER SU
D. HE TB

A

B. HE MU

54
Q

Which 802.11ax guard interval (GI) is intended solely for outdoor communications?

A. 0.4 microseconds
B. 0.8 microseconds
C. 1.6 microseconds
D. 3.2 microseconds
E. 6.4 microseconds

A

D. 3.2 microseconds

55
Q

MU-MIMO communications is ideal for which real-world Wi-Fi environment?

A. High client density indoor Wi-Fi deployment
B. Active client roaming indoor Wi-Fi deployment
C. Point-to-point outdoor Wi-Fi bridge link
D. Point-to-multipoint outdoor Wi-Fi bridge link

A

D. Point-to-multipoint outdoor Wi-Fi bridge link

56
Q

Which 802.11ax capability gives a Wi-Fi 6 client the capability to opt out of synchronized uplink communications and contend for the RF medium independently?

A. ROM
B. TOM
C. QAM
D. TWT
E. OBSS

A

B. TOM

57
Q

Which type of wired access switch technology is the most important consideration when deploying 4×4:4 or 8×8:8 Wi-Fi 6 access points?

A. STP
B. SPB
C. AVB
D. PoE
E. IGMP

A

D. PoE

58
Q

Which type of 802.11 frame is used during UL-OFDMA by Wi-Fi 6 clients to communicate to the AP about their transmit needs?

A. BSR
B. BSRP
C. MU-RTS
D. MU-BAR
E. BQRP

A

A. BSR

59
Q

What are some of the key differences and advantages of OFDMA over MU-MIMO with 802.11ax radios? (Choose all that apply.)

A. Increased efficiency
B. Increased capacity
C. Best for high-bandwidth applications
D. Best for low-bandwidth applications
E. Best with small packets
F. Best with large packets

A

A. Increased efficiency
D. Best for low-bandwidth application
E. Best with small packets

60
Q

802.11ax BSS color information is communicated at both the PHY layer and the MAC sublayer. Which of these statements are true about BSS color? (Choose all that apply.)

A. The primary BSS color identifiers are blue, red, and yellow.
B. The secondary BSS color identifiers are green, orange, and purple.
C. BSS color is a numerical identifier.
D. BSS color is an identifier of the basic service set.
E. BSS color is an identifier of the basic service area.

A

C. BSS color is a numerical identifier.
D. BSS color is an identifier of the basic service set.

2x BSS color and **set*