LABSIM 6.13 Practice Questions – Flashcards

Unlock all answers in this set

Unlock answers
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
answer
A rogue access point
question
Which of the following describes marks that attackers place outside a building to identify an open wireless network?
answer
Warchalking
question
The process of walking around an office building with an 802.11 signal detector is known as what?
answer
Wardriving
question
Which of the following describes Bluesnarfing?
answer
Unauthorized viewing calendar, emails, and messages on a mobile device
question
Which of the following sends unsolicited business cards and messages to a Bluetooth device?
answer
Bluejacking
question
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?
answer
Disable Bluetooth on the phone
question
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?(Select two)
answer
Bluetooth and 802.11g
question
Your organization uses an 802.11g wireless network. Recently, other tenants installed the following equipment in your building:....since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
answer
The wireless TV system
question
Which of the following best describes an evil twin?
answer
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information
question
Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?
answer
Encryption
question
Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?
answer
Sniffing
question
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.
answer
Check the MAC addresses of devices connected to your wired switch and conduct a site survey
question
Match the malicious interference type with the appropriate characteristic.
answer
Spark Jamming = Repeatedly blasts receiving equipment with high-intensity, short-duration RF bursts at a rapid pace Random Noise Jamming = Produces RF signals using random amplitudes and frequencies Random Pulse Jamming = uses radio pulses of random amplitude and frequency
question
The attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end-user devices and the reader in the kiosk. She then uses that information later on to masquerade as the original end-user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario?
answer
NFC Relay Attack
question
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose an inexpensive, consumer grade access point. While reading the documentation, you notice that the access point supports Wi-Fi protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce the risk?
answer
Disable WPS in the access point's configuration
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New