Quiz 8 Flashcards

1
Q

RF signal “noise” that creates interference and prevents communications from occurring is called signal blocking. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RFID is commonly used to transmit information between networked computers.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For IEEE WLANs, the maximum transmit power is 200 milliwatts (mW).
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The current Bluetooth version is Bluetooth 6.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In ad hoc mode, devices can only communicate between themselves and cannot connect to another network.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Piconets in which connections exist between different piconets are known as which of the following terms?

  1. broadnet
  2. honeynet
  3. boundnet
  4. scatternet
A
  1. scatternet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select the device that is designed to exclusively monitor the RF frequency for network transmissions?

  1. access point probe
  2. dedicated probe
  3. WAP
  4. wireless device probe
A
  1. WAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which encryption protocol below is used in the WPA2 standard?

A

AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The MAC address is a unique 64-bit number that is “burned” into the network interface card adapter when it is manufactured.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RF signals can be picked up from an open or mis-configured AP.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most secure form of IEEE 802.1x authentication?

A

certificate-based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

A

rogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bluetooth is an example of what type of technology below?

  1. Small Area Network
  2. Private Area Network
  3. Personal Area Network
  4. Limited Area Network
A
  1. Personal Area Network
17
Q

What is the maximum range of most Bluetooth 5 devices?

18
Q

What type of radio frequency transmissions are used by Bluetooth devices?

  1. single-range radio
  2. long-range radio
  3. short-range radio
  4. ultra-short-range radio
A
  1. short-range radio
19
Q

Slave devices that are connected to a piconet and are sending transmissions are known as what?

  1. active slave
  2. passive slaves
  3. parked slaves
  4. neutral slaves
A
  1. active slave
20
Q

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

  1. Bluesnarfing
  2. Bluejacking
  3. Bluecracking
  4. Bluetalking
A
  1. Bluejacking
21
Q

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?

Bluejacking

Bluecracking

Bluesnarfing

Bluetalking

A

Bluesnarfing

22
Q

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired

  1. networks
  2. access Point
  3. endpoint
  4. WMM
  5. ad-hoc peer
A
  1. access Point
23
Q

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

  1. active twin
  2. authorized twin
  3. internal replica
  4. evil twin
24
Q

What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security?

  1. captive portal AP
  2. gateway access point
  3. wireless device probe
  4. AUP access point
A
  1. captive portal AP
25
Where does the supplicant send identity information? 1. client 2. second supplicant 3. authenticator 4. certificate authority
3. authenticator
26
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS. - EAP-MSCHAPv2 - EAP-AKA - EAP-FAST - EAP-TLS
EAP-FAST