quiz 7 Flashcards
Default accounts often have weak passwords.
True—Devices with default accounts such as “admin” often have weak passwords or no password at all.
Six characters or more constitutes a strong password.
False—A strong password is often classified as eight characters or more, along with other complexity requirements, although some companies stress the need for more characters.
Privilege escalation is used in computer programs to bypass normal authentication.
False—Privilege escalation is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user. Backdoors are used in computer programs to bypass normal authentication and other security mechanisms in place.
Fiber-optic cable is not susceptible to data emanations.
True—Fiber-optic cable is not susceptible to data emanations in the way that twisted-pair cable is.
RFI is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation.
False—RFI is for example interference that can come from AM/FM transmissions and cell towers. EMI is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation.
Crosstalk is when a signal transmitted on one copper wire creates an undesired effect on another wire; the signal “bleeds” over, so to speak.
True - Crosstalk is when a signal transmitted on one copper wire creates an undesired effect on another wire; the signal “bleeds” over, so to speak. The original crosstalk dealt with phone conversations, but the term is used for data transmissions as well. W
Data emanation occurs most commonly on coaxial cable.
True—Data emanation occurs most commonly on coaxial cable but can also occur on twisted-pair cable.
One way to secure the administration interface of a WAP is to turn it off when not in use.
False—Turning off the WAP can make it inaccessible to client computers. It cannot change the state of the administration interface.
WEP is deprecated; it should be replaced with a more secure protocol, such as WPA.
True—WEP is an older encryption protocol for wireless networks. It should be replaced with a stronger protocol, such as WPA or WPA2.
WPA2 has a typical key size of 128 bits.
False—WPA2 has a typical key size of 256 bits.
Which of the following has the strongest level of encryption? A. WEP B. WAP C. WPA D. WPA2
D. WPA2 has the strongest level of encryption at 256 bits. WEP is weak, deprecated, and should be replaced. WAP stands for wireless access point. WPA2 is stronger than WPA and should be used if possible.
Which of the following is not a good strategy for securing a WAP? A. NAT filtering B. Turn off the SSID C. Place it in a Faraday cage D. Use PNAC
C. If a WAP is placed in a Faraday cage, no clients can access it! However, using NAT filtering, disabling the SSID, and using PNAC are all ways to secure the WAP.
A person searches for wireless networks from their car. What is this an example of? A. Wardriving B. DDoS C. Replay attack D. Bluejacking
. A. Wardriving is the act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna. DDoS and replays are network attacks. Bluejacking is the sending of unsolicited messages to a Bluetooth-enabled phone.
Which of the following is the unauthorized access of information from a wireless device through a Bluetooth connection? A. Bluejacking B. Bluesnarfing C. Bluebeard D. The blues
B. Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection. Bluejacking is the sending of unsolicited messages to a Bluetooth-enabled phone. Bluebeard and the blues do not have to do with wireless technologies.
What should you configure to improve wireless security? A. Enable the SSID. B. IP spoofing. C. Remove repeaters. D. MAC filtering.
D. MAC filtering disallows connections from any wireless clients unless the wireless client’s MAC address is on the MAC filtering list.