Module 29 - Wireless Threats - Q&A Flashcards
Which of the following would describe an attack in which the attacker sets up a malicious access point configured almost identically to a legitimate one? A. Impersonation attack B. Evil twin attack C. Spoofing attack D. Rogue traffic attack
B. In an evil twin attack, the attacker sets up a malicious access point configured almost identically to a legitimate one.
Which of the following can happen if an attacker sets the power levels on a rogue access point to overpower the wireless transmissions of a legitimate access point? A. Jamming B. Beaconing C. Deauthentication D. Spoofing
A. Jamming can occur if an attacker sets the power levels on a rogue access point to overpower the wireless transmissions of a legitimate access point.
Which of the following older attacks involves marking attributes of wireless access points on walls or the sidewalk? A. AP tagging B. Geo-tagging C. Wardriving D. Warchalking
D. Warchalking is an older attack that involves marking attributes of wireless access points on walls or the sidewalk with chalk.
Which of the following actions may be considered illegal, depending upon where they take place? (Choose two.) A. Wardriving B. W archalking C. Jamming attacks D. Deauthentication attacks
C, D. Both jamming and deauthentication attacks may be considered illegal, depending on the area in which they are conducted. Wardriving and warchalking are not necessarily illegal, as long as there is no effort made to connect illegally to someone else’s wireless network.
You are installing a wireless network for a small business. You decide to sniff traffic on the wireless network to see if it is secure. You can read all the traffic through your wireless sniffer program. Which of the following should you configure on the wireless network to prevent packet sniffing? A. Encryption settings B. Username and password C. Private IP address D. Access point power settings
A. Configuring encryption on a wireless network can prevent packet sniffing.
Which of the following technologies requires that two devices be touching each other in order to communicate? A. 802.1 li B. WPA C. Bluetooth D. NFC
D. NFC requires that two devices be touching each other in order to communicate.
Which of the following describes an attack in which an attacker captures credentials and transmits them to another host for authentication? A. Replay attack B. Rogue access point C. IV attack D. Packet sniffing
A. In a replay attack, an attacker captures credentials and transmits them to another host for authentication.
All of the following are valid security issues that allow attacks on WEP, except. A. 24-bit initialization vectors B. Implementation ofRC4 C. Repeated keys D. Use of AES
D. WEP does not use AES as its encryption protocol.
Which of the following is an attack vector on networks that use WPA or WPA2? A. Use of RC4 B. Weak passphrases C. 24-bit initialization vectors D. Use of AES
B. Use of weak passphrases is an attack vector on networks that use WPA or WPA2.
Which of the following attacks enables a malicious person to steal data via Bluetooth devices? A. Bluesneaking B. Bluejacking C. Bluesnarfing D. Rogue access point
C. Bluesnarfing enables a malicious person to steal data via Bluetooth devices.