Quiz 8 Flashcards

1
Q

RF signal “noise” that creates interference and prevents communications from occurring is called signal blocking. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RFID is commonly used to transmit information between networked computers.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For IEEE WLANs, the maximum transmit power is 200 milliwatts (mW).
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The current Bluetooth version is Bluetooth 6.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In ad hoc mode, devices can only communicate between themselves and cannot connect to another network.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Piconets in which connections exist between different piconets are known as which of the following terms?

  1. broadnet
  2. honeynet
  3. boundnet
  4. scatternet
A
  1. scatternet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select the device that is designed to exclusively monitor the RF frequency for network transmissions?

  1. access point probe
  2. dedicated probe
  3. WAP
  4. wireless device probe
A
  1. WAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which encryption protocol below is used in the WPA2 standard?

A

AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The MAC address is a unique 64-bit number that is “burned” into the network interface card adapter when it is manufactured.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RF signals can be picked up from an open or mis-configured AP.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most secure form of IEEE 802.1x authentication?

A

certificate-based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

A

rogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bluetooth is an example of what type of technology below?

  1. Small Area Network
  2. Private Area Network
  3. Personal Area Network
  4. Limited Area Network
A
  1. Personal Area Network
17
Q

What is the maximum range of most Bluetooth 5 devices?

A

D. 800 ft

18
Q

What type of radio frequency transmissions are used by Bluetooth devices?

  1. single-range radio
  2. long-range radio
  3. short-range radio
  4. ultra-short-range radio
A
  1. short-range radio
19
Q

Slave devices that are connected to a piconet and are sending transmissions are known as what?

  1. active slave
  2. passive slaves
  3. parked slaves
  4. neutral slaves
A
  1. active slave
20
Q

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

  1. Bluesnarfing
  2. Bluejacking
  3. Bluecracking
  4. Bluetalking
A
  1. Bluejacking
21
Q

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?

Bluejacking

Bluecracking

Bluesnarfing

Bluetalking

A

Bluesnarfing

22
Q

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired

  1. networks
  2. access Point
  3. endpoint
  4. WMM
  5. ad-hoc peer
A
  1. access Point
23
Q

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

  1. active twin
  2. authorized twin
  3. internal replica
  4. evil twin
A
  1. evil twin
24
Q

What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security?

  1. captive portal AP
  2. gateway access point
  3. wireless device probe
  4. AUP access point
A
  1. captive portal AP
25
Q

Where does the supplicant send identity information?

  1. client
  2. second supplicant
  3. authenticator
  4. certificate authority
A
  1. authenticator
26
Q

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.

  • EAP-MSCHAPv2
  • EAP-AKA
  • EAP-FAST
  • EAP-TLS
A

EAP-FAST