Chapter 7 test 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
1) In the TJX breach, attackers first got into the network through ________. A) spear phishing B) an inside conspirator C) the use of weak wireless encryption D) all of the above
answer
C
question
2) Wireless LAN standards come from ________. A) OSI B) TCP/IP C) both A and B D) neither A nor B
answer
A
question
3) To drive around a city looking for working access points that are unprotected is ________. A) drive-by hacking B) war driving
answer
B
question
4) Breaking into WLANs from outside the premises is ________. A) drive-by hacking B) war driving
answer
A
question
5) 802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B
answer
C
question
6) In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server
answer
A
question
7) Which 802 working group created 802.11i? A) 802.1 B) 802.3 C) 802.11 D) It was not an 802 working group. It was the Wi-Fi Alliance
answer
C
question
8) Which offers stronger security? A) WPA B) 802.11i C) Both A and B offer equally strong security.
answer
B
question
9) What is the strongest security protocol for 802.11 today? A) 802.11i B) 802.11s C) 802.11X D) WPA
answer
A
question
10) In what mode of 802.11i operation is a central authentication server used? A) 802.1X mode B) PSK mode C) both A and B D) neither A nor B
answer
A
question
11) In 802.11i ________, hosts must know a shared initial key. A) 802.1X mode B) PSK mode C) both A and B D) neither A nor B
answer
B
question
12) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) session C) 802.1X D) preshared
answer
B
question
13) After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) the preshared key B) an 802.1X key C) WPS keys D) different session keys
answer
D
question
14) For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication. A) always use the same preshared key each time it is connected B) always use the same session key each time it is connected C) both A and B D) neither A nor B
answer
D
question
15) Session keys are used to ________. A) make cryptanalysis more difficult B) improve authentication C) both A and B D) neither A nor B
answer
A
question
16) Which of the following is a risk in 802.11i PSK mode? A) WPS can easily be cracked if it is used. B) Unauthorized sharing of the pre-shared key. C) A weak passphrase may be selected. D) all of the above
answer
D
question
17) In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 8 B) 12 C) 20 D) 128
answer
C
question
18) Part of WPS weakness is caused by ________. A) 802.1X mode B) WPA2 preshared key mode C) dividing the 8 digit PIN into two 4 digit halves D) IPsec
answer
C
question
19) Which of the following has a dangerous vulnerability that is causing problems today? A) PEAP B) 802.11i C) WPA D) WPS
answer
D
question
20) If a firm has many access points, it should use ________ mode in 802.11i. A) PSK B) 802.1X C) IPsec D) PEAP
answer
B
question
21) The Wi-Fi Alliance calls 802.1X mode ________ mode. A) enterprise B) personal C) WEP D) WPA
answer
A
question
22) In ________, the authenticator is the ________. A) 802.1X, wireless access point B) 802.11i, switch C) 802.11i, wireless access point D) 802.1X, central authentication server
answer
C
question
23) 802.1X requires security between the supplicant and the authenticator in ________. A) Ethernet B) 802.11 C) both A and B D) neither A nor B
answer
B
question
24) An unauthorized internal access point is a(n) ________ access point. A) evil twin B) rogue C) shadow D) counterfeit
answer
B
question
25) A rogue access point is created by ________. A) an employee B) an external attacker C) the IT security department D) an evil twin
answer
A
question
26) A rogue access point ________. A) is an unauthorized internal access point B) often has very poor security C) often operates at high power D) All of the above are true.
answer
D
question
27) A notebook computer configured to act like a real access point is a(n) ________. A) evil twin access point B) rogue access point
answer
A
question
28) Which of the following is usually set up by a hacker outside the building? A) a rogue access point B) an evil twin access point C) both A and B D) neither A nor B
answer
B
question
29) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s). A) one B) two C) four D) 16
answer
B
question
30) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs B) VPNs C) PEAP D) 802.1X mode
answer
B
question
31) In VPNs designed to frustrate evil twin attacks, the shared secret ________. A) is transmitted in the clear B) is transmitted with cryptographic protections C) is not transmitted D) Any of the above.
answer
C
question
32) Centralized access point management ________. A) increases management costs but provides better control B) reduces management costs
answer
B
question
33) Managed access points should ________. A) allow access point power to be adjusted remotely B) provide constant transmission quality monitoring C) both A and B D) neither A nor B
answer
C
question
34) Managed access points should ________. A) identify rogue access points B) be able to push updates out to access points C) both A and B D) neither A nor B
answer
C
question
35) Which is the correct formula for decibels? A) 10 * P2/P1 B) 10 * (P2/P1)2 C) Log10(P2/P1) D) none of the above
answer
D
question
36) An 8/1 increase in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 20 D) none of the above
answer
D
question
37) A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 9 D) none of the above
answer
C
question
38) A 100/1 increase in power corresponds to approximately ________ decibels. A) 6 B) 10 C) 20 D) none of the above
answer
C
question
39) 1 Watt represents a dBm value of about ________. A) 10 B) 20 C) 30 D) We cannot say because only one power is given.
answer
C
question
40) A radio that has a power of 8 mW represents a ratio of about ________ dBm. A) 2 B) 8 C) 9 D) 10
answer
C
question
41) I wish to have a wireless LAN to serve my house. I will use ________. A) 802.11 B) Bluetooth C) either A or B
answer
A
question
42) Bluetooth is for ________. A) large WLANs B) cable replacement C) both A and B D) neither A nor B
answer
B
question
43) Which of the following was created for PANs? A) 802.11 B) Bluetooth C) both A and B D) neither A nor B
answer
B
question
44) Bluetooth is standardized by the ________. A) 802.11 Working Group B) Wi-Fi Alliance C) Bluetooth Special Interest Group D) none of the above
answer
C
question
45) Which form of Bluetooth has a typical transmission speed of less than 3 Mbps? A) classic Bluetooth B) high-speed Bluetooth C) personal Bluetooth D) none of the above
answer
A
question
46) Which form of Bluetooth has a typical transmission speed of about 24 Mbps? A) classic Bluetooth B) high-speed Bluetooth C) enterprise Bluetooth D) none of the above
answer
B
question
47) Which of the following can use access points? A) 802.11 B) Bluetooth C) both A and B D) neither A nor B
answer
A
question
48) In Bluetooth, a master can have up to ________ slaves at any moment. A) 1 B) 3 C) 12 D) none of the above
answer
D
question
49) At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master? A) the Bluetooth phone B) the Bluetooth headset C) Both are simultaneously masters and slaves.
answer
B
question
50) Which Bluetooth profile would a desktop use with a Bluetooth keyboard? A) Bluetooth input profile B) Bluetooth I/O profile C) human interface device profile D) none of the above
answer
C
question
51) Near-field communication has a maximum transmission distance of about ________. A) 400 cm/200 in B) 40 cm/20 in C) 4 cm/2 in D) The devices must be physically touching.
answer
C
question
52) In which frequency band does NFC operate? A) 2.4 GHz B) 5 GHz C) both A and B D) neither A nor B
answer
D
question
53) Passive RFID chips are powered by ________. A) a battery B) the sun C) body temperature D) none of the above
answer
D
question
54) Passive RFID chips are powered by ________. A) a battery B) the sun C) body temperature D) the scanning unit
answer
D
question
55) Which of the following uses an access point? A) traditional Wi-Fi B) Wi-Fi Direct C) both A and B D) neither A nor B
answer
A
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New