CH 11 - Wireless Security Flashcards
What are the two types of wireless networks?
A. Star and ring
B. Bus and hybrid
C. Infrastructure and hybrid
D. Infrastructure and ad hoc
D.
Infrastructure and ad hoc
How many stages are used in the WPA handshake?
A. Two
B. Four
C. Three
D. One
B.
Four
What mode has to be enabled on a network interface to allow all headers in wireless traffic to be captured?
A. Promiscuous
B. Monitor
C. Radio
D. Wireless LAN
B.
Monitor
What wireless attack would you use to take a known piece of information to be able to decrypt wireless traffic?
A. Sniffing
B. Deauthentication
C. Key reinstallation
D. Evil twin
C.
Key reinstallation
What is the purpose of performing a Bluetooth scan?
A. Identifying open ports
B. Identifying available profiles
C. Identifying endpoints
D. Identifying vendors
C.
Identifying endpoints
What is the purpose of a deauthentication attack?
A. Disabling stations
B. Forcing stations to reauthenticate
C. Reducing the number of steps in the handshake
D. Downgrading encryption
B.
Forcing stations to reauthenticate
What is the policy that allows people to use their own smartphones on the enterprise network?
A. Bring your own device
B. Use your own device
C. Bring your own smart device
D. Use your own smart device
A.
Bring your own device
What part of the encryption process was weak in WEP?
A. Keying
B. Diffie‐Hellman
C. Initialization vector
D. Seeding vector
C.
Initialization vector
What is the WPA four‐way handshake used for?
A. Passing keys
B. Deriving keys
C. Encrypting messages
D. Initialization seeding
B.
Deriving keys
What is the SSID used for?
A. Encrypting messages
B. Providing an IP address
C. Identifying a network
D. Seeding a key
C.
Identifying a network
What kind of access point is being used in an evil twin attack?
A. Infrastructure
B. Ad hoc
C. WPA
D. Rogue
D.
Rogue
How does an evil twin attack work?
A. Phishing users for credentials
B. Spoofing an SSID
C. Changing an SSID
D. Injecting four‐way handshakes
B.
Spoofing an SSID
What is a method to successfully get malware onto a mobile device without having to get the user to do something they wouldn’t normally do?
A. Using the Apple Store or Google Play Store
B. Using external storage on an Android
C. Using a third‐party app store
D. Jailbreaking
C.
Using a third‐party app store
What would you use a bluebugging attack for?
A. Identifying Bluetooth devices nearby
B. Listening to a physical space
C. Enabling a phone’s camera
D. Gathering data from a target system
B.
Listening to a physical space
What would a signal range for a Class A Bluetooth device commonly be?
A. 300 ft.
B. 3,000 ft.
C. 75 ft.
D. 500 ft.
A.
300 ft.