Beyond the Basic LAN Flashcards
What is the common name for the class of hardware that is 802.11i compliant?
A) WPA
B) WPA2
C) TKIP
D) 802.1x
B) WPA2
WPA2 is correct. WPA was the intermediate standard between WEP and WPA2; TKIP was the original name for what became WPA; and 802.1x (d) is just an authentication protocol in 802.11i.
In an open network environment, what is the name of the tool Mike uses just to look at and capture cookies?
A) Cookie Monster
B) Wireshark
C) Cookie Cadger
D) Kali Linux
C) Cookie Cadger
Cookie Cadger is correct. Cookie Monster is the Sesame Street character who loves to eat cookies; Wireshark is used to see the TCP stream, and Kali Linux is the operating system that includes these tools.
If Jackie adds an unauthorized WAP to a network because she wants faster access, what has she installed?
A) Rogue access point
B) Evil twin
C) Malware
D) Trojan
A) Rogue access point
Rogue access point is correct. An evil twin is installed to do something “bad” within the network. Malware and Trojans are programs, not actual devices.
Which suite of utilities does Mike use in the video to crack WEP encryption?
A) aircrack - ng
B) Kali Linux
C) dd-wrt
A) aircrack - ng
The correct answer is aircrack -ng.
Which of these is an effective way to keep WPA/WPA2 secure?
A) Keeping your machine disconnected from the network
B) Locking your office
C) Using long, complicated, private shared keys
D) You can’t secure WPA/WPA2, use WEP instead
C) Using long, complicated, private shared keys
Using long, complicated, private shared keys is correct.
How many digits does the WPS pin/key contain?
A) 4
B) 8
C) 64
D) 125
B) 8
8 is correct.
True or false: You do not need to be able to read log files to efficiently utilize the capabilities of WIDS.
A) True
B) False
B) False
False. Logs are the output received from WIDS. If you can’t read them, WIDS will not do you much good.
Which antenna type would be best used at a sporting event, requiring 360⁰ coverage in three dimensions (spherical)?
A) Omni
B) Directional
C) Dipole
D) Patch
A) Omni
Omni is the only antenna type that has 360⁰ spherical coverage making it effective for a large area such as an arena. Dipole is the most common antenna but does not have full 360⁰ spherical coverage. Dipole has a 360⁰ flat (donut-shaped) coverage. Directional has a pattern that is effective for pointing in a precise area. Patch is a 180⁰ low-profile antenna that mounts on a flat surface.
True or false: Emulation and virtualization are the same thing.
A) True
B) False
B) False
False. Emulators use software to simulate an entirely different hardware platform (such as a modern computer emulating an old Atari) in order to run software made for that other platform. Virtualization enables one physical computer to power more than one virtual machine, each of which can still only run software that is compatible with the underlying hardware platform.
Which of the following is true about containers?
A) Containers cannot access other containers
B) Containers run independent of all network resources
C) Containers run a single program and all its dependencies
D) Containers are only available on virtual machines
C) Containers run a single program and all its dependencies
A container runs a single program and all its dependencies. A container can access other containers, and the container uses network resources. Although a container is virtual in nature, it does not need to run on a virtual machine.
What is the name of the IaaS provider Mike uses in his example?
A) AWS
B) Dropbox
C) TotalSem
D) Microsoft
A) AWS
AWS is correct.
What does SaaS stand for?
A) Smiling at a Sunset
B) Simple access authority Software
C) Software as a Service
D) Service authentication access Service
C) Software as a Service
Software as a Service is correct.
Which of the following are virtual deployment models?
A) VDE B) VDI C) Public cloud D) Community cloud E) All of the above
E) All of the above
The correct answer is all of the above. Virtual Desktop Environment (VDE), Virtual Desktop Infrastructure (VDI), public and community clouds are all deployment models of virtualized work environments. Depending on the environment, mobility needs, and security, some or all of these deployment models may be used.
What connection method on mobile devices is most secure?
A) Hardware tethering
B) Hotspots
C) NFC
D) Bluetooth
A) Hardware tethering
The correct answer is hardwire tethering. Mobile devices have high security issues. For tight security, hardwire tethering is the most secure without hotspots, NFC, or Bluetooth enabled. The other methods build more fortified security with use of passwords and single sign-on.
A company gives its employees identical mobile devices and stipulates that they are only to be used for work activities. Which type of deployment model is this?
A) Bring your own device (BYOD)
B) Corporate owned, personally enabled (COPE)
C) Corporate owned, business only (COBO)
D) Choose your own device (CYOD)
C) Corporate owned, business only (COBO)
COBO is correct.