Module 11 - Wireless Network Security Q Flashcards

1
Q

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?

A

Bluesnarfing

Bluesnarfing is a type of attack that uses unauthorized access to steal information from a wireless device through a Bluetooth connection. In a Bluesnarfing attack, the attacker can copy emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?

A

Evil twin

An evil twin is designed to mimic an authorized access point (AP) so that a user’s mobile device, such as a laptop or tablet, unknowingly connects to the evil twin instead. Attackers can then capture the transmissions from users to the evil twin access point (AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so?

A

A WLAN consumer attack, because many users fail to properly configure security on their home WLANs

Attacks against consumers’ home WLANs are considered easy because many users fail to properly configure security on their home wireless networks. Attackers access insecure wireless networks for multiple reasons, including to steal data, read wireless transmissions, and inject malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between protecting against eavesdropping and protecting against a man-in-the-middle (MITM) attack?

A

Eavesdropping can be prevented by being aware of one’s surroundings while using NFC technology, while MITM attack can be prevented by configuring in a pairing method so only one side can send and the other can receive it at a time

In eavesdropping attacks, the attacker must be extremely close to pick up the signal; hence, it can be prevented if users are aware of their surroundings while making a payment. In MITM attacks, the attacker can interfere with NFC communications between devices and send false responses. This can be prevented by configuring the device in pairing so one device can only send while the other can only receive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements correctly defines jamming?

A

An attacker intentionally floods the RF spectrum with extraneous RF signal “noise” that creates interference and prevents communications

Jamming occurs when an attacker intentionally floods the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following contains the field that indicates the function of the packet and an identifier field used to match requests and responses and the type of data being transported along with the data itself?

A

EAP

An extensible authentication protocol (EAP) packet contains a field that indicates the packet’s function (such as response or request) and an identifier field used to match requests and responses. Response and request packets also have a field that indicates the type of data being transported (such as an authentication protocol) along with the data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In which of the following attacks do attackers use intentional interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP?

A

Wireless denial of service attacks

In wireless denial of service (DoS) attacks, which are also referred to as jamming, the attacker can use intentional radio frequency (RF) interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP. This attack prevents the transmission of data to or from network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?

A

Eavesdropping

In eavesdropping, unauthorized users can listen to communications between RFID tags and readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of APs can be managed by wireless LAN controllers (WLCs)?

A

Controller AP

Controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is a single device that can be configured and then used to automatically distribute the settings to all controller APs. A remote office WLAN controller manages multiple WLCs at remote sites from a central location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are jamming attacks generally rare?

A

They require expensive, sophisticated equipment

Jamming attacks generally are rare because sophisticated and expensive equipment is necessary to flood the RF spectrum with enough interference to impact the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which site survey tool is used to visually represent wireless network details such as channel bandwidth, channel coverage, data rate, and interference, among others?

A

Wi-Fi analyzers

A Wi-Fi analyzer helps to visualize essential details of the wireless network. An analyzer can provide information such as signal strength, network health, channel bandwidth, channel coverage, data rate, and interference (noise).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wireless probe is designed to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?

A

Wireless device probe

A standard wireless device, such as a portable laptop computer, can be configured to act as a wireless probe. At regular intervals during the normal course of operation, the device can scan and record wireless signals within its range and report this information to a centralized database. The scanning is performed when the device is idle and not receiving any transmissions. Using several mobile devices as wireless device probes can provide a high degree of accuracy in identifying rogue access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security protocol encrypts transmissions by using a shared secret key combined with an initialization vector (IV) that changes each time a packet is encrypted?

A

WEP

In wired equivalent privacy (WEP), the shared secret key is combined with an initialization vector (IV). The IV and the key are combined and used as a seed for generating a random number necessary in the encryption process. The IV and encrypted ciphertext are both transmitted to the receiving device. Upon arrival, the receiving device first separates the IV from the encrypted text and then combines the IV with its shared secret key to decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate the IoT device?

A

Subscriber identity module

A SIM card is an integrated circuit that securely stores information used to identify and
authenticate the IoT device on a cellular network like 5G. Some IoT devices use a SIM card (subscriber identity module card) for data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves?

A

Dedicated probe

A dedicated probe is designed to exclusively monitor for RF transmissions. Dedicated probes only monitor the airwaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sherlin is the owner of a cosmetics store. She wanted to introduce a wireless network in the store, but her employees were against it. Sherlin ended up purchasing an inexpensive wireless router and secretly connected it to the wired network. Unfortunately, this unknowingly provided open access to the wireless signal.

What type of attack has Sherlin made her store’s network vulnerable to?

A

Rogue access point

A rogue AP is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. For example, although firewalls are typically used to restrict specific attacks from entering a network, an attacker who can access the network through a rogue AP is behind the firewall

17
Q

Suzanne is a cybersecurity expert. She was approached by Alex with a complaint that his payment information has leaked even though he has not made any online payments or shared information with anyone. Suzanne concluded that attackers most likely bumped a portable reader against Alex’s smartphone to make an NFC connection and steal the payment information stored on the phone.

What should Suzanne suggest to Alex to prevent this type of attack from happening in the future?

A

Alex should always turn the NFC off while he’s in a crowded area

Alex was the victim of data theft through NFC. He can prevent this in the future by ensuring his NFC is turned off when he is in crowded areas

18
Q

Zara has been instructed to organize an event where top companies will come and give a webinar. Since the event is large and the number of people attending is substantial, Zara needs to ensure that there are no disturbances. She thinks preventing devices from communicating and calls from being made or received is the easiest solution.

Which factor should Zara use to achieve this?

A

Jamming

Jamming prevents the transmission of data to or from network devices by intentionally flooding the RF spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring

19
Q

John is instructed by his CEO to introduce an employee attendance system that replaces the current manual-sign register. The system cannot use a power supply and must adhere to COVID-19 protection protocols.

What method should John use for this system?

A

RFID

Radio frequency identification (RFID) is commonly used to transmit information between paper-based tags that can be detected by a proximity reader. RFID tags do not require a power supply as they are small and thinner than a sheet of paper. This tag can be added to the employee’s ID and tapped on the reader to mark attendance and prevent employees from physically touching the same surface and spreading communicable diseases

20
Q

Zain, a telecom engineer, plans to relocate a particular AP antenna to a new location. Which of the following configuration options will he use to adjust frequency bands, optimum channels, and available spectrum for data transfer?

A

Spectrum selection

Some access points provide the ability to adjust frequency spectrum settings such as the frequency band, channel selection, and channel width

21
Q

Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long battery life, high connection density, and has a low-power wide-area network?

A

Narrowband IoT

The narrowband internet of things (NB-IoT) is a low-power wide-area network (LPWAN) radio technology standard. NB-IoT is a wide-range cellular service that focuses on indoor coverage, low cost, long battery life, and high connection density

22
Q

Melvin is moving his small business from his basement to an office building now that he has five full-time employees. What type of enterprise AP should he choose when setting up the new office’s WLAN?

A

Fat AP

Fat APs are autonomous and entirely self-contained. Their autonomous functioning makes them ideal for small offices with a handful of APs. In large enterprises or college campuses with hundreds or even thousands of APs, fat APs are not a viable option because each AP is autonomous. A single wireless network configuration change will require reconfiguring each AP individually, which can take an extended period and manpower to complete

23
Q

Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must provide an internet connection as an access point, mirror a smartphone screen on the LED dash display, and have a hands-free system where drivers can use voice controls to browse their phone’s contact list, make and receive hands-free phone calls, and use navigation apps.

Which technology should he use and why?

A

Bluetooth, because it can be used to pair devices, allowing for hands-free and screen mirroring features

Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing for rapid “on-the-fly” connections between Bluetooth-enabled devices. Bluetooth provides the ability to mirror screens, use voice controls, and access the internet

24
Q

Under which vulnerability can an attacker steal information from a user’s phone using a device to connect to the phone without physically touching it?

A

Data theft

In data theft, attackers use NFC to connect a portable reader to a user’s smartphone in a crowd to steal payment information stored on the phone

25
Q

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection.

Which technology should Sherry suggest?

A

Bluetooth technology can be used to connect devices without any wired connection

Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing rapid “on-the-fly” connections between Bluetooth-enabled devices. This can be of use in medical and health services

26
Q

Shawn is approached by a medical staff team with a request to research and introduce a type of device that will help them record and transmit specific patient details.

Which technology would help the team measure and monitor blood pressure and then send those patient details from the smartphone to a phone as a message in case of emergencies?

A

Bluetooth

Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing for rapid “on-the-fly” connections between Bluetooth-enabled devices. A smart tracker or watch can detect and measure blood pressure and send alerts to other devices

27
Q

Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security?

A

MAC

The media access control address (MAC) is a hardware address that uniquely identifies each network node. It is a unique 48-bit number “burned” into the network interface card adapter when it is manufactured. MAC filtering is a security measure to prevent unwanted network access by hackers

28
Q

Sam is asked to help his company design a wireless network for their new location.

Which of the following protocols has the strongest wireless security, supports a longer bit of encryption, and improved interaction capabilities with the internet of things (IoT) devices?

A

WPA3

WPA3 aims to deliver a suite of features to simplify security configuration for users while enhancing network security protections. The WPA3 SAE is designed to increase security at the handshake when keys are being exchanged. The result is that WPA3 can give stronger security even if short or weak passwords are used

29
Q

Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company’s IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database?

A

Wireless device probe

Standard wireless devices, such as portable laptop computers, can be configured to act as wireless probes. At regular intervals during the normal course of operation, the device can scan and record wireless signals within its range and report this information to a centralized database. The scanning is performed when the device is idle and not receiving any transmissions. Using several mobile devices as wireless device probes can provide a high degree of accuracy in identifying rogue access points

30
Q

Which of the following differentiates an access point probe and a dedicated probe?

A

A dedicated probe only monitors RF transmissions, while an access probe can serve as both a probe and an access point that can provide roaming to wireless users

A dedicated probe is designed to exclusively monitor the RF for transmissions. An access point probe is designed to serve as both a probe and an access point that can provide roaming to wireless users if they are placed so that their signals overlap