SEC+ Revision Questions Wireless Networking and Security Flashcards

1
Q

While reviewing wireless router logs, you notice wireless network usage by unfamiliar systems. How can you control which systems connect to your wireless network?
A. Change the SSID.
B. Disable DHCP.
C. Change the wireless router admin password.
D. Enable MAC address filtering.

A

D. Enable MAC address filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enabling WPA on a WLAN provides what? (Choose two.)
A. Confidentiality
B. Integrity
C. Availability
D. Authorization

A

A. Confidentiality
&
B. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In addition to encrypting wireless traffic, you configure your wireless router to require connecting users to authenticate against a RADIUS server. What type of security have you configured?
A. WEP
B. TKIP
C. WPA2 Personal
D. WPA2 Enterprise

A

D. WPA2 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You decide to capture network traffic with a sniffer while connected to a busy public Wi-Fi hotspot. After several minutes you realize you can see only your own network traffic in addition to broadcasts and multicasts. Why can you not see anybody else’s wireless network traffic?
A. WPA encryption is in use.
B. The SSID is not broadcasting.
C. MAC filtering is enabled.
D. Isolation mode is enabled.

A

D. Isolation mode is enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A curious IT professional drives through an industrial park late at night while scanning for unsecured wireless networks with a PDA. What is this called?
A. Network scanning
B. War driving
C. War dialing
D. War chalking

A

B. War driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To which of the following security concerns does EAP apply?
A. Virus scanning
B. Hard disk encryption
C. Network authentication
D. Firewall rules

A

C. Network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which mechanism requires only a server-side PKI certificate to encrypt user authentication traffic?
A. EAP
B. PEAP
C. LEAP
D. EAP-TLS

A

B. PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are configuring access to a wireless LAN on a Windows 8.1 laptop. When you list available wireless networks, you notice multiple listings of Hidden Network. What wireless router option is in use for these hidden networks?
A. Disable SSID broadcast
B. MAC address filtering
C. WEP
D. WPA

A

A. Disable SSID broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which wireless encryption protocol uses counter mode to make pattern detection difficult?
A. CCMP
B. CHAP
C. WEP
D. RSA

A

A. CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are conducting a wireless site survey at a client site. The client expresses a desire to keep wireless transmissions secure. There is a single 802.11n wireless router with omnidirectional antennae in the server room at one end of the building. WPA2 enterprise and MAC filtering have been configured. What additional security issue should you address?
A. WPA2 Personal should be used.
B. MAC filtering is useless; MAC addresses are easily spoofed.
C. Move the wireless router to the center of the building.
D. Upgrade the wireless router to 802.11m.

A

C. Move the wireless router to the center of the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be done to secure a wireless network?
A. Decrease power transmission level to cover only the intended area.
B. Use a wireless encryption standard such as 802.3.
C. Change the DHCP-supplied default gateway address.
D. Configure wireless router admin access to use HTTP.

A

A. Decrease power transmission level to cover only the intended area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Windows user in your company issues the following command on their company wireless laptop: netsh wlan set hosted network mode=allow ssid=AcmeWLAN key=password. What best describes the security problem created by this user?
A. The user has administrative rights in Windows 7.
B. The key is not complex enough.
C. The user has created a rogue access point.
D. The SSID name is invalid.

A

C. The user has created a rogue access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are the wireless network administrator. Users report unstable wireless 802.11g network connectivity. After careful examination, you realize 2.4GHz wireless phones and Bluetooth devices are interfering with the Wi-Fi signal. Which choice offers the best solution?
A. Replace the 802.11g network with 802.11n.
B. Cease using all 2.4GHz wireless phones and Bluetooth devices.
C. Purchase a high-gain antenna for your wireless router.
D. Change the Wi-Fi channel used by your wireless router.

A

D. Change the Wi-Fi channel used by your wireless router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hacker configures a rogue access point to appear as a legitimate Wi-Fi hotspot. Which term best describes this configuration?
A. Evil twin
B. Bad rogue
C. War driving
D. War chalking

A

A. Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following refers to unsolicited messages sent to nearby Bluetooth devices?
A. Bluespamming
B. Bluejacking
C. Bluehacking
D. Bluedriving

A

B. Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following refers to unauthorized data access of a Bluetooth device over a Bluetooth wireless network?
A. Bluejacking
B. Bluesnarfing
C. Packet sniffing
D. Port scanning

A

B. Bluesnarfing

17
Q

You are working at a client site to solve wireless performance issues. In doing so, you notice WEP is configured on the client’s wireless routers. What type of attack might this network be susceptible to?
A. DDoS
B. IV attack
C. ARP poisoning
D. Dictionary attack

A

B. IV attack

18
Q

How can you control whether all wireless devices will see your WLAN name?
A. Disable SSID broadcasting.
B. Block packet sniffing.
C. Reduce transmission power level.
D. Change antenna placement.

A

A. Disable SSID broadcasting.

19
Q

Which of the following items could interfere with an 802.11g wireless network?
A. Remote garage door opener
B. Microwave oven
C. Television infrared remote
D. Cell phone

A

B. Microwave oven

20
Q

In securing a wireless network, you decide to enable EAP-TLS to authorize wireless client access to the wireless LAN. What should you do next?
A. Install a public key certificate on the client and a smartcard on the server.
B. Install a smartcard on the client and a public key certificate on the server.
C. Install MS-CHAP on the client and a public key certificate on the server.
D. Install a smartcard on the client and MS-CHAP on the server.

A

B. Install a smartcard on the client and a public key certificate on the server.

21
Q

TKIP is used primarily by which wireless standard?
A. 802.11n
B. WEP
C. WPA
D. 802.1x

A

C. WPA

22
Q

You are a Wi-Fi IT specialist. Users report that the new 802.11g network is not running at the advertised 54Mbps. What should you tell your wireless users?
A. 802.11g runs at 11Mbps.
B. Wireless encryption will be disabled to increase bandwidth.
C. Wi-Fi bandwidth is shared by all users connected to the same wireless network.
D. SSID broadcasting will be disabled to increase bandwidth.

A

C. Wi-Fi bandwidth is shared by all users connected to the same wireless network.

23
Q

Which standard requires stations to authenticate prior to gaining network access?
A. 802.11a
B. 802.11b
C. 802.1x
D. 802.3

A

C. 802.1x

24
Q

You are securing your Wi-Fi network infrastructure. You configure network monitoring software with a list of valid wireless access point MACs allowed on the network. What type of threat will this enable you to detect?
A. Rogue access points
B. War driving
C. Bluesnarfing
D. Bluejacking

A

A. Rogue access points

25
Q

You are configuring a wireless network for your home office. Which options are applicable to a home network? (Choose two.)
A. WPA2 PSK
B. WPA2 Enterprise
C. EAP-TLS
D. WPA PSK

A

A. WPA2 PSK
&
D. WPA PSK

26
Q

A traveling user calls the help desk regarding her wireless connectivity problem. When she attempts to connect to a visible wireless network at full strength, it eventually times out with no further messages. What is the problem?
A. The user does not have the WPA2 PSK configured on her station.
B. MAC address filtering is blocking her wireless network card.
C. The user needs an external antenna for her wireless card.
D. She must enter the SSID.

A

B. MAC address filtering is blocking her wireless network card.

27
Q

You are enjoying a cup of coffee at the local coffee shop when all of a sudden your cell phone displays an anonymous message complimenting you on your Hawaiian shirt. What are you a victim of?
A. Bluetoothing
B. Bluesnarfing
C. Bluejacking
D. Bluedriving

A

C. Bluejacking

28
Q

You are the owner of Stacey’s Coffee Spot, a coffee shop providing customers with international coffee flavors in a relaxing environment. To collect payment, you would like to implement a technology whereby your clients can simply wave their smart phone a few centimeters from a payment terminal. Which of the following should you employ?
A. MIMO
B. NFC
C. Channel bonding
D. Captive portal

A

B. NFC

29
Q

Which of the following statements regarding replay attacks is true?
A. They are applicable only to WEP-configured wireless networks.
B. They can be prevented by configuring the use of captive portal.
C. They can be prevented by disabling SSID broadcasting.
D. They are conducted by capturing and resending wireless network traffic.

A

D. They are conducted by capturing and resending wireless network traffic.

30
Q

You are configuring a new wireless router and notice a PIN on the back of the wireless router. What is the purpose of the PIN?
A. It allows home users to easily secure a wireless network.
B. It is a Bluetooth pairing code.
C. It is the WEP key.
D. It is the WPA key.

A

A. It allows home users to easily secure a wireless network.

31
Q

Patchy-Adams is a unique medical research facility specializing in the use of laugher and vitamin C to cure illness. You have been hired by Patchy-Adams to propose a wireless network implementation strategy adhering to the following requirements:
* The fastest possible throughput is needed.
* Wireless users must be authenticated against their network user accounts.
* Administrative access to wireless networks must be secure.
* Only company-issued wireless devices are allowed to connect to the wireless network. Which of the following lists meets the requirements listed above?
A. Directional antenna, WEP, SSH, MAC filtering
B. MIMO, WPA2 Enterprise, SSH, MAC filtering
C. MIMO, WEP, SSL, MAC filtering
D. MIMO, WPA2 Enterprise, SSL, MAC filtering

A

D. MIMO, WPA2 Enterprise, SSL, MAC filtering