Chapter 8 Flashcards
Which of the following is used on a wireless network to identify the network name?
MAC address
SSID
IP address
Subnet mask
SSID
Which of the following is generated after a site survey and shows the Wi-Fi signal strength throughout the building?
Analyzer
Ad hoc
Diagram
Heat map
Heat Map
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart.
Which type of wireless antenna should you use on each side of the link? (Select two.)
Directional
Omni-directional
Parabolic
High-gain
Normal-gain
Parabolic
High-gain
The IT manager has tasked you with installing the new wireless LAN controller (WLC).
Where should you install the controller?
Network closet
Manager’s Office
Roof
Lobby
Network closet
Which type of wireless access point is generally used in a residential setting?
LWAP
Bridge
SOHO
WLC
SOHO
You need to implement a solution to manage multiple access points in your organization. Which of the following would you most likely use?
LWAP
Bridge
SOHO
WLC
WLC
Which of the following devices would you use to perform a site survey?
Wi-Fi analyzer
Wireless interface
Heat map
Wireless access point
Wi-Fi analyzer
Which of the following types of site surveys should be performed first?
Predictive
Passive
Ad hoc
Active
Passive
Which of the following is responsible for broadcasting information and data over radio waves?
Wireless bridge
Wireless access point
Wireless interface
Wireless LAN controller
Wireless access point
Which class of wireless access point (WAP) has everything necessary to manage clients and broadcast a network already built into its functionality?
Bridge
Ad hoc
Fat
Thin
Fat
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
Bluebugging
Bluejacking
Bluesnarfing
Slamming
Bluejacking
Which of the following best describes Bluesnarfing?
Sending anonymous electronic business cards
Viewing calendar, emails, and messages on a mobile device without authorization
Executing commands on a mobile device
Cloning a mobile device
Viewing calendar, emails, and messages on a mobile device without authorization
Which type of interference is caused by motors, heavy machinery, and fluorescent lights?
EMI
RFID
NFC
RFI
EMI
Which of the following best describes an evil twin?
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
A threat agent that marks the outside of buildings to indicate the presence of a wireless network.
An access point that is added to a network by an internal employee to provide unauthorized network access.
A Bluetooth device that receives mobile phone commands via bluebugging.
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
Listen to exam instructions
Which type of attack is WEP extremely vulnerable to?
Cloning
Evil twin
IV attack
Bluesnarfing
IV attack
You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network’s signal.
Which type of attack are you most likely experiencing?
Cloning
Jamming
Bluesnarfing
Disassociation
Jamming
An attacker has intercepted near-field communication (NFC) data and is using that information to masquerade as the original device.
Which type of attack is being executed?
Bluesnarfing
Disassociation
Cloning
Relay
Relay
Which type of RFID tag can send a signal over a long distance?
NFC
Active
Bluetooth
Passive
Active
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network.
One day, you find that an employee has connected a wireless access point to the network in his office.
Which type of security risk is this?
Physical security
Man-in-the-middle attack
Rogue access point
Phishing
Social engineering
Rogue access point
You are concerned that wireless access points may have been deployed within your organization without authorization.
What should you do? (Select two. Each response is a complete solution.)
Implement a network access control (NAC) solution.
Check the MAC addresses of devices connected to your wired switch.
Implement an intrusion prevention system (IPS).
Implement an intrusion detection system (IDS).
Conduct a site survey.
Check the MAC addresses of devices connected to your wired switch.
Conduct a site survey.
You want to connect a laptop computer running Windows to a wireless network.
The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled.
What should you do?
Configure the connection with a pre-shared key and AES encryption.
Configure the connection to use 802.1x authentication and TKIP encryption.
Configure the connection to use 802.1x authentication and AES encryption.
Configure the connection with a pre-shared key and TKIP encryption.
Configure the connection with a pre-shared key and AES encryption.
You need to add security for your wireless network, and you would like to use the most secure method.
Which method should you implement?
WPA2
WPA
WEP
Kerberos
WPA2
You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network. You have come to the conclusion that you must manually configure the access point (AP).
Which of the following values uniquely identifies the network AP?
SSID
WEP
Channel
PS
SSID
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests.
The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet.
What should you do?
Implement MAC address filtering
Implement a captive portal
Implement 802.1x authentication using a RADIUS server
Implement pre-shared key authentication
Implement a captive portal
Which EAP implementation is MOST secure?
LEAP
EAP-MD5
EAP-TLS
EAP-FAST
EAP-TLS
Which of the following do switches and wireless access points use to control access through a device?
Session filtering
IP address filtering
Port number filtering
MAC address filtering
MAC address filtering
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
On the wireless access point and on each wireless device
On a RADIUS server
On the wireless access point
On a certificate authority (CA)
On a RADIUS server
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)
Use open authentication with MAC address filtering
Use shared secret authentication
Configure devices to run in infrastructure mode
Install a RADIUS server and use 802.1x authentication
Configure devices to run in ad hoc mode
Configure devices to run in infrastructure mode
Install a RADIUS server and use 802.1x authentication
You’ve just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from using the access point (AP) configuration utility?
Isolate the AP from the client’s wired network.
Implement MAC address filtering.
Change the channel used by the AP’s radio signal.
Change the administrative password on the AP.
Change the administrative password on the AP.
You need to configure a wireless network using WPA2-Enterprise. Which of the following components should be part of your design? (Select two.)
TKIP encryption
AES encryption
Pre-shared keys
802.1x
WEP encryption
Open authentication
AES Encryption
802.1x