51-100 Flashcards

1
Q

Given: WLAN protocol analyzers can read and reject many wireless frame parameters.

What parameter is needed to physically locate rogue APs with a protocol analyzer?

A. signal strength

B. RSNE

C. RSSI

D. IP address

E. Noise Flow

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11r introduces new frame exchange protocol to support key management during fast secure transitions. Two of the new exchange protocols are the Over-the –air protocol and the other-DS FT protocol.

In what ways do these frames exchange protocols differ from each other?

A. In Over-the –air protocol sends frames directly to new AP, while the other the DS FT protocol used the old AP to forward the frames to the New AP via the wired network.

B. Over-the –air FT protocol uses the 4 way handshake to establish encryption keys, while the over the DS ft protocol does not.

C. Over-the –air FT protocol is used during a layer 2 roam, while the over-the-DS FT protocol does not.

D. Over-the –air FT protocol used during layer 2 raom, while the over-the-DS FT protocol is used when layer 3 rams are occurring

E. Over-the –air FT protocol rules ion 802.11k neighbor reports to initiate roamingdecisions, while the other-the DS FT protocol does not.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Picture

ABC Company has deployed single channel architecture (SCA) solution to help overcome some of the common problems with the client roaming. The figure shows the overlapping coverage area of multiple APs in ABC’s network. In this network all APs are configured with the same channel and BSSID. PEAPv0/EAP-MSCHAPv2 is only supported authentication mechanism.

As the VoWiFi client move through out this network, what events are occurring?

A. STA-1 controls when and where to roam by using signal and performance matrices in accordance with the chipset drivers.

B. The WLAN controller is querying the RADIUS server for authentication before STA-1’s association is moved from one AP to the next.

C. STA-1 initiates open authentication and 802.11 associations with each AP prior to Roaming.

D. The WLAN controller controls the AP to which STA-1 is associated and transparently moves this association in accordance with STA-1’s physical location.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As part of large organization’s security policy how should a wireless security professional address to problem of rogue access points?

A. Use a WPA-2 Enterprise complaint security solution with strong mutual authentication and encryption.

B. Hide the SSID of legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.

C. All authorized APs should have there wired ports quarantined to specific VLAN for threat neutralization and analysis.

D. A trained employee should install and monitor and WIPS rogue detection and response measures.

E. Conduct through mutual facility scans with spectrum analyzers to detect rogue AP RF

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Given: ABC corporation is selecting a security solution for there new WLAN. Two of there considered solutions PPTP VPN and 802.1XEAP. They have considered a PPTP VPN and because it is included with both server and desktop operating system. With both solutions are considered strong enough to adhere to corporate security police, the company is worried about security weakness of MS-CHAPv2 authentication.

As a consultant what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)

A. MS-CHAPv2 is secure when implemented with AES-CCMP encryption.

B. MS-CHAPv2 is complaint with WPA-personal, not WPA-2-Enterprise.

C. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.

D. MS-CHAPv2 uses anonymous differ-Helliman authentication, and therefore secure.

E. MS-CHAPv2 is only secure when combined with WEP.

F. MS-CHAPv2 is subject to offline dictionary attacks.

A

C, F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Given: ABC Corporation’s 802.11 WLAN is comprised of a redundant WLAN controller paid and 30-access points. ABC implemented WEP encryption with IPSec VPN technology to secure there wireless communication because it was the strongest security solution available at the time it was implemented. IT management has had decided to upgrade the WLAN infrastructure and implement VoWiFi and is connected with security because most VoWiFi phones do no support IPSec.

As the wireless network administrator, what new security solution would be best for protecting ABC’s data?

A. Migrate to a new multi=factor security solution using WPA-2 personal, MAC filtering, SSID holding, stateful packet inspection and RBAC.

B. Migrate corporate data clients to WPA-Enterprise and segment VoWiFi phone by assigning them to a different frequency band.

C. Migrate corporate data and VoWiFi devices to WPA-2 Enterprise with OKC support, and segment VoWiFi data on separate VLAN.

D. Migrate all 802.11 data and devices to WPA-personal, and implement a secure DHCP server to allocate addresses from a segment subnet for the VoWiFi phones.

E. Migrate corporate data clients to WPA-2-Enterprise, and use the RADIUS server to implement MAC-base authentication of VoWiFi phones.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select the answer option that arranges the numbered events in correct time sequence for a client associating to BSS using EAP-PEAPv0/MSCHAPv2.

1) Installation of PTK
2) Installation of 4-way handshake
3) 802.11 association
4) 802.1X uncontrolled port is opened for data traffic 5) Client validates server certificate

A. 1-2-4-2-5

B. 5-3-1-2-4

C. 3-4-2-1-5

D. 5-3-4-2-1

E. 4-3-2-1-5

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When used as portal of WLAN authentication solution, what is rule of LDAP?

A. An authentication server (AS) that communicates directly with, and provide authentication for supplicant.

B. A SQL complaint authentication service capable of encryption key generation and distribution.

C. AnX500 standard compliant database that participates in the 802.1X port-based access control process

D. A data retrieval protocol used by an authentication server such as RADIUS.

E. A role-based access control mechanism for filtering data to/from authenticated stations

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Given:A WLAN protocol analyzer captured the illustrated frame trace of an 802.11g (ERP) client station connecting to an 802.11g access point.

What is shown in included frame trace? (Choose 4)

A. Active scanning

B. WPA2-enterprise authentication

C. 802.11 open system authentication

D. 802.1X with dynamic WEP

E. 4-way handshake

A

A, B, C, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

A. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake even if connectivity is lost.

B. When the RF signal between a client and an access point is lost, the client will seek to reassociate with another access point with a different SSID and stronger high quality signal.

C. Client drivers typically scan for a connect to access points in the 22.4GHz band before scanning the 5GHz band.

D. When the RF signal between a client and in an access point is disrupted for more than a few seconds, the client device will repeatedly attempt the reestablish both layer 2 and layer 3 connections.

E. As specified by 802.11 standard, clients using open system authentication must allow direct client-to-client connections, even in infrastructure mode

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following protocols is used to provide on-demand authentication within an ongoing data transmission?

A. LEAP

B. EAP

C. PPTP

D. CHAP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a common Windows authentication protocol used by the IEEE 802.1X security standard?

A. TACACS

B. LDAP

C. RADIUS

D. SSL/TLS

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following authentication processes are specified by the IEEE 802.11 standards? Each correct answer represents a complete solution. Choose all that apply.

A. Open System authentication

B. RADIUS

C. Shared Key authentication

D. EAP

A

A, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following methods are capable of operating in wireless networks? Each correct answer represents a complete solution. Choose all that apply.

A. EAP-TLS

B. LEAP

C. PEAP

D. EAP-TTLS

A

A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

A. Rainbow attack

B. DoS attack

C. Replay attack

D. ARP spoofing

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following protocols uses a program layer located between the Internet’s Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers?

A. TFTP

B. HTTPS

C. SCP

D. SSL

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You have been hired to perform a penetration test on a client’s network. You want to see if remote connections are susceptible to eavesdropping or perhaps session hijacking. Which network tool would be most helpful to you?

A. Vulnerability analyzer

B. Port scanner

C. Performance analyzer.

D. Protocol analyzer

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

A. Remote Authentication Dial-In User Service (RADIUS)

B. IEEE 802.1x

C. Wired Equivalent Privacy (WEP)

D. Wi-Fi Protected Access 2 (WPA2)

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following will you recommend for providing security?

A. HTTP

B. VPN

C. SSL

D. S/MIME

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following tools is John using to crack the wireless encryption keys?

A. Kismet

B. AirSnort

C. Cain

D. PsPasswd

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following tools is John using to crack the wireless encryption keys?

A. Kismet

B. AirSnort

C. Cain

D. PsPasswd

A

B

22
Q

Which of the following are the important components of the IEEE 802.1X architecture? Each correct answer represents a complete solution. Choose all that apply.

A. Authenticator server

B. Extensible Authentication Protocol (EAP)

C. Supplicant

D. Authenticator

A

A, C, D

23
Q

You work as a System Administrator for Tech Perfect Inc. The company has a wireless LAN network. You want to implement a tool in the company’s network, which monitors the radio spectrum used by the wireless LAN network, and immediately alerts you whenever a rogue access point is detected in the network. Which of the following tools will you use?

A. Firewall

B. WIPS

C. MFP

D. NAT

A

B

24
Q

Which of the following methods can be used to detect a rogue access point in order to enhance the security of the network? Each correct answer represents a complete solution. Choose all that apply.

A. Install WIPS

B. Hide the SSID of all AP

C. Check in the managed AP list

D. Use of wireless sniffing tools

A

A, C, D

25
Q

Which of the following works as a protocol for providing secure communications between wireless clients and wireless access points?

A. Virtual Private Network

B. Firewall

C. Packet filtering

D. Robust Secure Network

A

D

26
Q

Which of the following is a type of security management for computers and networks in order to identify security breaches?

A. EAP

B. IPS

C. IDS

D. ASA

A

C

27
Q

Which of the following types of attacks cannot be prevented by a firewall? Each correct answer represents a complete solution. Choose all that apply.

A. Shoulder surfing attack

B. Ping flood attack

C. URL obfuscation attack

D. Phishing attack

A

A, C, D

28
Q

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

A. SSL

B. Telnet

C. SCP

D. SSH

A

D

29
Q

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

A. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

B. Attacker by creating a fake wireless network with high power antenna cause Victor’s computer to associate with his network to gain access.

C. Attacker can use the Ping Flood DoS attack if WZC is used.

D. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

A

A, B

30
Q

Which of the following is a part of computer network that is used to prevent unauthorized Internet users from accessing private networks connected to the Internet?

A. Protocol analyzer

B. Wired Equivalent Privacy

C. Intrusion detection system

D. Firewall

A

D

31
Q

Which of the following are the components of wireless intrusion prevention system (WIPS)?

Each correct answer represents a complete solution. Choose all that apply.

A. Sensors

B. Console

C. Supplicant

D. Server

A

A, B, D

32
Q

Which of the following attacks are examples of Denial-of-service attacks (DoS)?

Each correct answer represents a complete solution. Choose all that apply.

A. Birthday attack

B. Fraggle attack

C. Ping flood attack

D. Smurf attack

A

B, C, D

33
Q

Which of the following stream ciphers is both a block cipher and a product cipher?

A. RC2

B. AES

C. DES

D. RC4

A

C

34
Q

Which of the following security protocols is supported by Wi-Fi Protected Access (WPA)?

A. CCMP

B. LEAP

C. TKIP

D. PEAP

A

C

35
Q

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN network. The clients present on the network are excluded. You check the error and find the reason that there is no DHCP server. Which of the following devices will you configure as a DHCP server?

A. Access point

B. Controller

C. RADIUS Server

D. Wireless LAN switches

A

B

36
Q

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?

A. Rogue AP

B. LWAPP

C. Lightweight AP

D. Autonomous AP

A

D

37
Q

Which of the following wireless security protocols is defined in IEEE 802.11 pre-RSNA security?

A. TKIP

B. WEP

C. EAP

D. CCMP

A

B

38
Q

Which of the following security levels are applied on the network to prevent unauthorized access? Each correct answer represents a complete solution. Choose all that apply.

A. Access control lists

B. Authentication

C. Authorization

D. MAC filtering

A

B, C

39
Q

Which of the following are legacy authentication protocols used within the stronger EAP authentication protocols? Each correct answer represents a complete solution. Choose all that apply.

A. MS-CHAP

B. PPTP

C. PAP

D. CHAP

A

A, C, D

40
Q

You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?

A. WEP

B. PKI

C. WPA2

D. WPA

A

C

41
Q

Which of the following monitors program activities and modifies malicious activities on a system?

A. RADIUS

B. NIDS

C. HIDS

D. Back door

A

C

42
Q

Which of the following are the layers of physical security?
Each correct answer represents a complete solution. Choose all that apply.

A. Procedural access control

B. Video monitor

C. Environmental design

D. Intrusion detection system

A

A, C, D

43
Q

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

A. Man-in-the-middle attack

B. Spoofing

C. Cyber squatting

D. Cyber Stalking

A

B

44
Q

Which of the following attacks are considered as authentication attacks? Each correct answer represents a complete solution. Choose all that apply.

A. Man-in-the-middle attack

B. Eavesdropper attack

C. Jamming attack

D. Denial-of-Service (DoS) attack

A

A, B

45
Q

Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (WIDS)?

A. MAC spoofing

B. Spectrum analyzer

C. Protocol analyzer

D. Rogue access point

A

C

46
Q

Which of the following attacks is used to obtain a user’s authentication credentials?

A. Teardrop attack

B. Brute force attack

C. Bonk attack

D. Phishing attack

A

B

47
Q

Which of the following are the three main intended goals of WEP encryption?

Each correct answer represents a complete solution. Choose all that apply.

A. Access control

B. Authentication

C. Data integrity

D. Confidentiality

A

A, C, D

48
Q

Which of the following encryption methods use the RC4 technology?
Each correct answer represents a complete solution. Choose all that apply.

A. Dynamic WEP

B. TKIP

C. Static WEP

D. CCMP

A

A, B, C

49
Q

Which of the following keys are used by the symmetric key algorithm? Each correct answer represents a complete solution. Choose all that apply.

A. Pairwise Transient Key

B. Public Key

C. Group Temporal Key

D. Private Key

A

D

50
Q

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

A. An unauthorized WAP is one way for hackers to get into a network.

B. It is likely to increase network traffic and slow down network performance.

C. This circumvents network intrusion detection.

D. None, adding a wireless access point is a common task and not a security risk.

A

A