SEC+ Revision Questions Wireless Networking and Security Flashcards
While reviewing wireless router logs, you notice wireless network usage by unfamiliar systems. How can you control which systems connect to your wireless network?
A. Change the SSID.
B. Disable DHCP.
C. Change the wireless router admin password.
D. Enable MAC address filtering.
D. Enable MAC address filtering.
Enabling WPA on a WLAN provides what? (Choose two.)
A. Confidentiality
B. Integrity
C. Availability
D. Authorization
A. Confidentiality
&
B. Integrity
In addition to encrypting wireless traffic, you configure your wireless router to require connecting users to authenticate against a RADIUS server. What type of security have you configured?
A. WEP
B. TKIP
C. WPA2 Personal
D. WPA2 Enterprise
D. WPA2 Enterprise
You decide to capture network traffic with a sniffer while connected to a busy public Wi-Fi hotspot. After several minutes you realize you can see only your own network traffic in addition to broadcasts and multicasts. Why can you not see anybody else’s wireless network traffic?
A. WPA encryption is in use.
B. The SSID is not broadcasting.
C. MAC filtering is enabled.
D. Isolation mode is enabled.
D. Isolation mode is enabled.
A curious IT professional drives through an industrial park late at night while scanning for unsecured wireless networks with a PDA. What is this called?
A. Network scanning
B. War driving
C. War dialing
D. War chalking
B. War driving
To which of the following security concerns does EAP apply?
A. Virus scanning
B. Hard disk encryption
C. Network authentication
D. Firewall rules
C. Network authentication
Which mechanism requires only a server-side PKI certificate to encrypt user authentication traffic?
A. EAP
B. PEAP
C. LEAP
D. EAP-TLS
B. PEAP
You are configuring access to a wireless LAN on a Windows 8.1 laptop. When you list available wireless networks, you notice multiple listings of Hidden Network. What wireless router option is in use for these hidden networks?
A. Disable SSID broadcast
B. MAC address filtering
C. WEP
D. WPA
A. Disable SSID broadcast
Which wireless encryption protocol uses counter mode to make pattern detection difficult?
A. CCMP
B. CHAP
C. WEP
D. RSA
A. CCMP
You are conducting a wireless site survey at a client site. The client expresses a desire to keep wireless transmissions secure. There is a single 802.11n wireless router with omnidirectional antennae in the server room at one end of the building. WPA2 enterprise and MAC filtering have been configured. What additional security issue should you address?
A. WPA2 Personal should be used.
B. MAC filtering is useless; MAC addresses are easily spoofed.
C. Move the wireless router to the center of the building.
D. Upgrade the wireless router to 802.11m.
C. Move the wireless router to the center of the building.
What can be done to secure a wireless network?
A. Decrease power transmission level to cover only the intended area.
B. Use a wireless encryption standard such as 802.3.
C. Change the DHCP-supplied default gateway address.
D. Configure wireless router admin access to use HTTP.
A. Decrease power transmission level to cover only the intended area.
A Windows user in your company issues the following command on their company wireless laptop: netsh wlan set hosted network mode=allow ssid=AcmeWLAN key=password. What best describes the security problem created by this user?
A. The user has administrative rights in Windows 7.
B. The key is not complex enough.
C. The user has created a rogue access point.
D. The SSID name is invalid.
C. The user has created a rogue access point.
You are the wireless network administrator. Users report unstable wireless 802.11g network connectivity. After careful examination, you realize 2.4GHz wireless phones and Bluetooth devices are interfering with the Wi-Fi signal. Which choice offers the best solution?
A. Replace the 802.11g network with 802.11n.
B. Cease using all 2.4GHz wireless phones and Bluetooth devices.
C. Purchase a high-gain antenna for your wireless router.
D. Change the Wi-Fi channel used by your wireless router.
D. Change the Wi-Fi channel used by your wireless router.
A hacker configures a rogue access point to appear as a legitimate Wi-Fi hotspot. Which term best describes this configuration?
A. Evil twin
B. Bad rogue
C. War driving
D. War chalking
A. Evil twin
Which of the following refers to unsolicited messages sent to nearby Bluetooth devices?
A. Bluespamming
B. Bluejacking
C. Bluehacking
D. Bluedriving
B. Bluejacking