Chapter 8 Flashcards

1
Q

Which of the following is used on a wireless network to identify the network name?

MAC address
SSID
IP address
Subnet mask

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is generated after a site survey and shows the Wi-Fi signal strength throughout the building?

Analyzer
Ad hoc
Diagram
Heat map

A

Heat Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart.

Which type of wireless antenna should you use on each side of the link? (Select two.)

Directional
Omni-directional
Parabolic
High-gain
Normal-gain

A

Parabolic
High-gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The IT manager has tasked you with installing the new wireless LAN controller (WLC).

Where should you install the controller?

Network closet
Manager’s Office
Roof
Lobby

A

Network closet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of wireless access point is generally used in a residential setting?

LWAP
Bridge
SOHO
WLC

A

SOHO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You need to implement a solution to manage multiple access points in your organization. Which of the following would you most likely use?

LWAP
Bridge
SOHO
WLC

A

WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following devices would you use to perform a site survey?

Wi-Fi analyzer
Wireless interface
Heat map
Wireless access point

A

Wi-Fi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following types of site surveys should be performed first?

Predictive
Passive
Ad hoc
Active

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is responsible for broadcasting information and data over radio waves?

Wireless bridge
Wireless access point
Wireless interface
Wireless LAN controller

A

Wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which class of wireless access point (WAP) has everything necessary to manage clients and broadcast a network already built into its functionality?

Bridge
Ad hoc
Fat
Thin

A

Fat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following sends unsolicited business cards and messages to a Bluetooth device?

Bluebugging
Bluejacking
Bluesnarfing
Slamming

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes Bluesnarfing?

Sending anonymous electronic business cards

Viewing calendar, emails, and messages on a mobile device without authorization

Executing commands on a mobile device

Cloning a mobile device

A

Viewing calendar, emails, and messages on a mobile device without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of interference is caused by motors, heavy machinery, and fluorescent lights?

EMI
RFID
NFC
RFI

A

EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following best describes an evil twin?

An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.

A threat agent that marks the outside of buildings to indicate the presence of a wireless network.

An access point that is added to a network by an internal employee to provide unauthorized network access.

A Bluetooth device that receives mobile phone commands via bluebugging.

A

An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Listen to exam instructions
Which type of attack is WEP extremely vulnerable to?

Cloning
Evil twin
IV attack
Bluesnarfing

A

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network’s signal.

Which type of attack are you most likely experiencing?

Cloning
Jamming
Bluesnarfing
Disassociation

A

Jamming

17
Q

An attacker has intercepted near-field communication (NFC) data and is using that information to masquerade as the original device.

Which type of attack is being executed?

Bluesnarfing
Disassociation
Cloning
Relay

A

Relay

18
Q

Which type of RFID tag can send a signal over a long distance?

NFC
Active
Bluetooth
Passive

A

Active

19
Q

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network.

One day, you find that an employee has connected a wireless access point to the network in his office.

Which type of security risk is this?

Physical security
Man-in-the-middle attack
Rogue access point
Phishing
Social engineering

A

Rogue access point

20
Q

You are concerned that wireless access points may have been deployed within your organization without authorization.

What should you do? (Select two. Each response is a complete solution.)

Implement a network access control (NAC) solution.

Check the MAC addresses of devices connected to your wired switch.

Implement an intrusion prevention system (IPS).

Implement an intrusion detection system (IDS).

Conduct a site survey.

A

Check the MAC addresses of devices connected to your wired switch.

Conduct a site survey.

21
Q

You want to connect a laptop computer running Windows to a wireless network.

The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled.

What should you do?

Configure the connection with a pre-shared key and AES encryption.

Configure the connection to use 802.1x authentication and TKIP encryption.

Configure the connection to use 802.1x authentication and AES encryption.

Configure the connection with a pre-shared key and TKIP encryption.

A

Configure the connection with a pre-shared key and AES encryption.

22
Q

You need to add security for your wireless network, and you would like to use the most secure method.

Which method should you implement?

WPA2
WPA
WEP
Kerberos

A

WPA2

23
Q

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network. You have come to the conclusion that you must manually configure the access point (AP).

Which of the following values uniquely identifies the network AP?

SSID
WEP
Channel
PS

A

SSID

24
Q

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests.

The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet.

What should you do?

Implement MAC address filtering

Implement a captive portal

Implement 802.1x authentication using a RADIUS server

Implement pre-shared key authentication

A

Implement a captive portal

25
Q

Which EAP implementation is MOST secure?

LEAP
EAP-MD5
EAP-TLS
EAP-FAST

A

EAP-TLS

26
Q

Which of the following do switches and wireless access points use to control access through a device?

Session filtering
IP address filtering
Port number filtering
MAC address filtering

A

MAC address filtering

27
Q

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On the wireless access point and on each wireless device
On a RADIUS server
On the wireless access point
On a certificate authority (CA)

A

On a RADIUS server

28
Q

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)

Use open authentication with MAC address filtering

Use shared secret authentication

Configure devices to run in infrastructure mode

Install a RADIUS server and use 802.1x authentication

Configure devices to run in ad hoc mode

A

Configure devices to run in infrastructure mode

Install a RADIUS server and use 802.1x authentication

29
Q

You’ve just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from using the access point (AP) configuration utility?

Isolate the AP from the client’s wired network.

Implement MAC address filtering.

Change the channel used by the AP’s radio signal.

Change the administrative password on the AP.

A

Change the administrative password on the AP.

30
Q

You need to configure a wireless network using WPA2-Enterprise. Which of the following components should be part of your design? (Select two.)

TKIP encryption
AES encryption
Pre-shared keys
802.1x
WEP encryption
Open authentication

A

AES Encryption
802.1x