Module 11 Flashcards
Which of these is a vulnerability of MAC address filtering in a WLAN?
- The user must enter the MAC.
- Not all operating systems support MACs.
- MAC addresses are initially exchanged unencrypted.
- APs use IP addresses instead of MACs.
-MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. Attackers monitoring the airwaves could easily see the MAC address of an approved device and then substitute it on their own device.
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
- EAP-FAST
- EAP-TTLS
- EAP-TLS
- EAP-SSL
EAP-FAST
Correct. This protocol securely tunnels any credential form for authentication (such as a password or a token) using TLS.
Imani has been asked to purchase wireless LAN controllers (WLCs) for the office. What type of APs must she also purchase that can be managed by a WLC?
- Any type of AP can be managed by a WLC
- Standalone AP
- Fat AP
- Controller AP
Controller AP
Correct. Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is the single device that can be configured, and then these settings are automatically distributed to all controller APs (a remote office WLAN controller is used to manage multiple WLCs at remote sites from a central location).
Nyla is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?
- Bluesnarfing
- Blueswiping
- Bluejacking
- Bluestealing
Correct. Bluesnarfing is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection. In a bluesnarfing attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission
Aaliyah has been asked to do research in a new payment system for the retail stores that her company owns. Which technology is predominately used for contactless payment systems that she will investigate?
- Bluetooth
- Near field communication (NFC)
- Wi-Fi
- Radio frequency ID (RFID)
-Near field communication (NFC)
Consumer NFC devices are most often used as an alternative to using cash or a credit card as a payment method and are called contactless payment systems. Users store payment card numbers in a “virtual wallet” on a watch or smartphone to pay for purchases at an NFC-enabled PoS checkout device.
Why are jamming attacks generally rare?
- They can’t get around new IEEE amendments that fully protect WLANs
- They can’t identify WLAN RF signals from other device signals
- The transmitter is not very powerful and must be close to the target
- They require expensive, sophisticated equipment
-They require expensive, sophisticated equipment
Correct. Jamming attacks generally are rare because sophisticated and expensive equipment is necessary to flood the RF spectrum with enough interference to impact the network.
Under which vulnerability can an attacker steal information from a user’s phone using a device to connect to the phone without physically touching it?
- Man-in-the-middle
- Data theft
- Eavesdropping
- Device theft
-Data theft
Correct. In data theft, attackers use NFC to connect a portable reader to a user’s smartphone in a crowd to steal payment information stored on the phone.
Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security?
- WPS
- WEP
- MAC
- WPA
MAC
The media access control address (MAC) is a hardware address that uniquely identifies each network node. It is a unique 48-bit number “burned” into the network interface card adapter when it is manufactured. MAC filtering is a security measure to prevent unwanted network access by hackers.
Sam is asked to help his company design a wireless network for their new location.
Which of the following protocols has the strongest wireless security, supports a longer bit of encryption, and improved interaction capabilities with the internet of things (IoT) devices?
- WEP
- WPA
- WPA3
- WPA2
WPA3
Correct. WPA3 aims to deliver a suite of features to simplify security configuration for users while enhancing network security protections. The WPA3 SAE is designed to increase security at the handshake when keys are being exchanged. The result is that WPA3 can give stronger security even if short or weak passwords are used.
What type of APs can be managed by wireless LAN controllers (WLCs)?
- Controller AP
- Captive portal APs
- Fat AP
- Standalone APs
Correct. Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is a single device that can be configured and then used to automatically distribute the settings to all controller APs. A remote office WLAN controller manages multiple WLCs at remote sites from a central location.
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?
- Evil twin
- Wireless denial of service attacks
- Rogue access point
- Intercepting wireless data
Correct. An evil twin is designed to mimic an authorized access point (AP) so that a user’s mobile device, such as a laptop or tablet, unknowingly connects to the evil twin instead. Attackers can then capture the transmissions from users to the evil twin access point (AP).
Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long battery life, high connection density, and has a low-power wide-area network?
- Narrowband IoT
- Cellular IoT baseband
- Subscriber identity module
- Zigbee
Correct. The narrowband internet of things (NB-IoT) is a low-power wide-area network (LPWAN) radio technology standard. NB-IoT is a wide-range cellular service that focuses on indoor coverage, low cost, long battery life, and high connection density.
Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must provide an internet connection as an access point, mirror a smartphone screen on the LED dash display, and have a hands-free system where drivers can use voice controls to browse their phone’s contact list, make and receive hands-free phone calls, and use navigation apps.
Which technology should he use and why?
- Bluetooth, because it can be used to pair devices, allowing for hands-free and screen mirroring features.
- WLAN, because it can be connected to the car’s internal computer system to provide internet and screen mirroring features.
- RFID devices, because they establish two-way communication between devices, which can be used to provide hands-free features with voice control.
- NFC, because it is used to transmit information between devices by a small tag that can help provide hands-free features and an internet connection.
Correct. Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing for rapid “on-the-fly” connections between Bluetooth-enabled devices. Bluetooth provides the ability to mirror screens, use voice controls, and access the internet.
Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate the IoT device?
- Zigbee
- Narrowband IoT
- Subscriber identity module
- Cellular IoT baseband
Correct. A **SIM** card is an integrated circuit that securely stores information used to identify and authenticate the IoT device on a cellular network like 5G. Some IoT devices use a SIM card (subscriber identity module card) for data transmissions.
Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so?
- A WDoS attack, because WLANs are less secure and can easily be hacked.
- A disassociation attack, because the device gets disconnected from the network and can be hacked easily.
- A WLAN consumer attack, because many users fail to properly configure security on their home WLANs.
- A jamming attack, because this attack can be achieved using mobile phone networks.
Correct. Attacks against consumers’ home WLANs are considered easy because many users fail to properly configure security on their home wireless networks. Attackers access insecure wireless networks for multiple reasons, including to steal data, read wireless transmissions, and inject malware.
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
- Frequency band
- Channel width
- Channel selection
- RFID spectrum
Correct. RFIDs do not have APs, but rather they are found on Wi-Fi networks.