Chapter 8 Securing Network Media and Devices Review Flashcards
Which of the following is the most secure protocol to use when accessing a wireless network?
A. WEP
B. WPA
C. WPA2
D. TKIP
C. WPA2
Wi-Fi Protected Access 2 is the most secure protocol listed for connecting to wireless networks. It is more secure than WPA and WEP. Wired Equivalent Privacy (WEP) is actually a deprecated protocol that should be avoided. The WEP algorithm is considered deficient for encrypted wireless networks. TKIP is also deprecated and is replaceable with CCMP
Which of the following is the unauthorized access of information from a Bluetooth device?
A. Bluejacking
B. Bluesnarfing
C. Deep Blue
D. The Blues Brothers
B. Bluesnarfing
Bluesnarfing is the unauthorized access of information from a Bluetooth device-for example, calendar, information, phonebook contacts, and so on.
Bluejacking is the sending of unsolicited messages to Bluetooth enabled devices. The other two aren’t relevant.
You scan your network and find a rogue access point with the same SSID used by your network. What type of attack is occurring?
A. War-driving
B. Bluesnarfing
C. Evil Twin
D. IV attack
C. Evil Twin
An evil twin is a rogue access pint that has the same SSID as another access point on the network. War-driving is when a person attempts to access wireless network, usually while driving in a vehicle. An IV attack is one that attempts to break the encryption of wireless protocols.
Which of the following is an unauthorized wireless router that allows access to a secure network?
A. Rogue Access Point
B. Evil Twin
C. War-driving
D. AP isolation
A. Rogue Access Point
A rogue access point is an unauthorized wireless router that allows access to a secure network. An evil twin is a type of rogue AP, but it also uses the same SSID as the legitimate network. AP isolation blocks each wireless user from communicating with each other.