Filters
Question type

Study Flashcards

Which encryption protocol below is used in the WPA2 standard?


A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:


A) EAP-MSCHAPv2
B) EAP-AKA
C) EAP-FAST
D) EAP-SIM

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Identify and describe two types of wireless probes.

Correct Answer

verifed

verified

Wireless device probe - a standard wirel...

View Answer

An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP​, with the intent to redirect client devices.

A) True
B) False

Correct Answer

verifed

verified

What are the four types of packets used by EAP?

Correct Answer

verifed

verified

EAP uses four types ...

View Answer

Explain why it is important to be able to control the power level at which the WLAN transmits.

Correct Answer

verifed

verified

Another security feature on some APs is ...

View Answer

APs use antennas that radiate a signal in all directions.

A) True
B) False

Correct Answer

verifed

verified

True

Bluetooth devices are not backward compatible with previous versions.

A) True
B) False

Correct Answer

verifed

verified

Which of the following choices is not one of the four types of packets used by EAP?


A) Request
B) Response
C) Success
D) Error

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the maximum number of characters that can exist within an SSID name?


A) 10
B) 12
C) 26
D) 32

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?


A) TKIP
B) LEAP
C) PEAP
D) ICMP

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Matching -The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.​


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

K) D) and I)
L) C) and I)

Correct Answer

verifed

verified

Discuss how to prevent bluesnarfing.

Correct Answer

verifed

verified

To prevent bluesnarfing, Bluetooth devices should be turned off when not being used or when in a room with unknown people. Another option is to set Bluetooth on the device as undiscoverable, which keeps Bluetooth turned on, yet it cannot be detected by another device.

Matching -The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.​


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

K) F) and H)
L) C) and H)

Correct Answer

verifed

verified

Matching -​A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

K) B) and I)
L) A) and C)

Correct Answer

verifed

verified

D

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?


A) active twin
B) authorized twin
C) internal replica
D) evil twin

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Matching -An attack that accesses unauthorized information from a wireless device through a Bluetooth connection​


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

K) D) and H)
L) C) and F)

Correct Answer

verifed

verified

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?


A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Describe a piconet.

Correct Answer

verifed

verified

When two Bluetooth devices come within r...

View Answer

​A __________________ is an in-depth examination and analysis of a wireless LAN site.

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer