Chapter 7 - Securing Network Media and Devices Flashcards

1
Q
Which of the following is the most secure protocol to use when accessing a wireless network?
A. WEP
B. WPA
C. WPA2
D. WEP2
A

C. Wi-Fi Protected Access 2 (WPA2) is the most secure protocol listed for connecting to wireless networks. It is more secure than WPA and WEP. Wired Equivalent Privacy (WEP) is actually a deprecated protocol that should be avoided, as is WEP2. The WEP and WEP2 algorithms are considered deficient for encrypted wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What type of cabling is the most secure for networks?
A. STP
B. UTP
C. Fiber-optic
D. Coaxial
A

C. Fiber-optic is the most secure because it cannot be tapped like the other three copper-based cables; it does not emit EMI. Although shielded twisted pair (STP) offers a level of security due to its shielding, it does not offer a level of security like to that of fiber-optic and is not the best answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What should you configure to improve wireless security?
A. Enable the SSID
B. IP spoofing
C. Remove repeaters
D. MAC filtering
A

D. MAC filtering disallows connections from any wireless clients unless the wireless client’s MAC address is on the MAC filtering list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
In a wireless network, why is an SSID used?
A. To secure the wireless access point
B. To identify the network
C. To encrypt data
D. To enforce MAC filtering
A

B. The SSID is used to identify the wireless network. It does not secure the wireless access point; one of the ways to secure a wireless access point is by masking the word disabling the SSID. The SSID does not encrypt data or enforce MAC filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the most commonly seen security risk of using coaxial cable?
A. Data that emanates from the core of the cable
B. Crosstalk between the different wires
C. Chromatic dispersion
D. Time domain reflection

A

A. Some types of coaxial cables suffer from the emanation of data from the core of the cable, which can be accessed. Crosstalk occurs on twisted-pair cable. Chromatic dispersion occurs on fiber-optic cable. Time domain reflection is a concept that is used by a TDR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Of the following, what is the most common problem associated with UTP cable?
A. Crosstalk
B. Data emanation
C. Chromatic dispersion
D. Vampire tapping
A

A. Of the listed answers, crosstalk is the most common problem associated with UTP cable. Older versions of UTP cable (for example, Category 3 or 5) are more susceptible to crosstalk than newer versions such as Cat 5e or Cat6.
Although data emanation can be a problem with UTP cable, it is more common with coaxial cable, as is vampire tapping. Chromatic dispersion is a problem with fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
What two security precautions can best help to protect against wireless network attacks?
A. Authentication and the WEP
B. Access control lists and WEP
C. Identification and WPA2
D. Authentication and WPA
A

D. The best two security precautions are authentication and WPA. Although WPA2 is more secure than WPA, the term identification is not correct. WEP is a deprecated wireless encryption protocol and should be avoided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following cables suffers from chromatic dispersion if the cable is too long?
A. Twisted-pair cable
B. Fiber-optic cable
C. Coaxial cable
D. USB cables
A

B. Fiber-optic cable is the only one listed that might suffer from chromatic
dispersion, because it is the only cable based on light. All the other answers are
based on electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following cable media is the least susceptible to a tap?
A. Coaxial cable
B. Twisted-pair cable
C. Fiber-optic cable
D. CATV cable
A

C. Fiber-optic cable is the least susceptible to a tap because it operates on the principle of light as opposed to electricity. All the other answers suffer from data emanation because they are all copper-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following, when removed, can increase the security of a wireless access point?
A. MAC filtering
B. SSID
C. WPA
D. Firewall
A

B. By removing the security set identifier or SSID, the wireless access point will be more secure, and it will be tougher for wardrivers to access that network. Of course, no new clients can connect to the wireless access point (unless they do so manually). MAC filtering, WPA, and firewalls are all components that increase the security of a wireless access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A wireless network switch has connectivity issues but only when the air-conditioning system is running.  What can be added to fix the problem?
A. Shielding
B. A wireless network
C. A key deflector
D. Redundant air-conditioning systems
A

A. By shielding the network switch, we hope to deflect any interference from the air conditioning system. Another option would be to move the network switch to another location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is the most secure type of cabling?
A. Unshielded twisted pair
B. Shielded twisted pair
C. Coaxial
D. Category five
A

B. Shielded twisted pair is the most secure type of cabling listed. It adds an aluminum sheath around the wires that can help mitigate data emanation. By far, fiber-optic would be the most secure type of cabling because it does not suffer from data emanation because the medium is glass instead of copper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following is the least secure type of wireless encryption?
A. WEP 64-bit
B. WEP 128-bit
C. WPA with TKIP
D. WPA2 with AES
A

A. WEP 64-bit is the least secure type of wireless encryption listed in the possible answers. The answers are listed in order from least secure to most secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is the unauthorized access of information from a Bluetooth device?
A. Bluejacking
B. Bluesnarfing
C. Blue privileges
D. The Blues Brothers
A

B. Bluesnarfing is the unauthorized access of information from a Bluetooth device, for example, calendar information, phonebook contacts, and so on. Bluejacking is the sending of unsolicited messages to Bluetooth-enabled devices. Blue privileges is not a valid answer, and if you answered the Blues
Brothers, you should reread this entire chapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following can be described as the act of exploiting a bug or flaw in software to gain access to resources that normally would be protected?
A. Privilege escalation
B. Chain of custody
C. Default account
D. Backdoor
A

A. Privilege escalation is as the act of exploiting a bug or flaw in software to gain access to resources that normally would be protected. Chain of custody is the chronological paper trail used as evidence. A default account is an account such as admin set up by the manufacturer on a device; it usually has a blank or simple password. A backdoor is used in computer programs to bypass normal authentication and other security mechanisms that might be in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does isolation mode on an AP provide?
A. Hides the SSID
B. Segments each wireless user from every other wireless user
C. Stops users from communicating with the AP
D. Stops users from connecting to the Internet

A

B. AP isolation mode segments every wireless user so they can’t communicate with each other. They can still communicate with the AP and access the Internet (or other network that the AP connects to). It does not hide the SSID.

17
Q
You scan your network and find a rogue access point with the same SSID used by your network.  What type of attack is occurring?
A. Wardriving
B. Bluesnarfing
C. Evil twin
D. IV attack
A

C. An evil twin is a rogue access point that has the same SSID as another access point on the network. Wardriving is when a person attempts to access a wireless network, usually while driving in a vehicle. Bluesnarfing is the unauthorized access of information through a Bluetooth connection. An IV attack is one that attempts to break the encryption of wireless protocols.

18
Q
Which of the following is an unauthorized wireless router that allows access to a secure network?
A. Rogue access point
B. Evil twin
C. Wardriving
D. AP isolation
A

A. A rogue access point is an unauthorized wireless router (or WAP) that allows access to a secure network. An evil twin is a type of rogue AP, but it also uses the same SSID as the legitimate network. Wardriving is the act of trying to access a wireless network. AP isolation blocks each wireless user from communicating with each other.

19
Q

Your boss asks you to limit the wireless signal of a WAP from going outside the building. What should you do?
A. Put the antenna on the exterior of the building
B. Disable the SSID
C. Enable MAC filtering
D. Decrease the power levels of the WAP

A

D. To limit the wireless signal, decrease the power levels! This can easily be done in most WAP control panels. Putting the antenna on the exterior of the building would make it easier for wardrivers to access the network, and more difficult for actual users. Disabling the SSID has no effect on the signal level. Nor does MAC filtering, though both of those methods can increase the security of your wireless network.