cyber security chapter 8
Identify the common acronym that describes the Wireless Network Name Drag and drop the check mark to the correct answer.
SID
This image shows part of a basic 802.11 data frame. The part shown here is the header.
MAC (Framo Control (2 bytes)
Duration (2 bytes)Address 1
(6 bytes)Address 2
(6 bytes)Sequence
Control(2 bytes)
Address 4(6 bytes))
In a situation where MIMO is used, the 802.11n standard has an average of what geographic range of up to
meters. In the space provided, enter only the numeric value?
400
Media Access Control (MAC) address filtering is a common type of wireless access control. How many bits in length is a MAC address?
48
which of these wifi protected setup ps method is vulnerable?
PIN method
Why is a rogue AP a
security vulnerability?
It allows an attacker to bypass network security configurations.
AES-CCMP is the encryption protocol standard used in what?
WPA2
Which of these is NOT a risk when a home wireless router is not securely configured?
Only a small percentage of the total traffic can be encrypted.
A wireless LAN controller 4 # (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?
Controller AP
Minh has been asked to
recommend an EAP for a
system that uses both
passwords and tokens with
TLS. Which should she
recommend?
EAP-FAST
The primary design of a(n)
what is to capture the
transmissions from legitimate users?
evil twin
Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?
Bluesnarfing
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi.
When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing.
What type of AP has he encountered?
Captive Portal
What is a difference between NFC and RFID?
RFID is designed for paper-based tags while NFC is not.
Which of these is NOT a type of wireless AP probe?
WNIC probe
What is the primary weakness of wired equivalent privacy (WEP)?
Its usage creates a detectable pattern.
WPA replaces WEP with what?
Temporal Key Integrity Protocol (TKIP)
Which of these is a
vulnerability of MAC address filtering?
MAC addresses are initially exchanged unencrypted.
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
RFID spectrum
Which of these is NOT a limitation of turning off the
SSID broadcast from an AP?
Users can more easily roam from one WLAN to another.
Elijah was asked by a student intern to explain the Extensible Authentication
Protocol (EAP). What would be the best explanation of EAP?
It is a framework for transporting authentication protocols
Which of the following is
NOT a wireless peripheral protection option?
Install a network sensor to detect an attack
Which technology is predominately used for contactless payment systems?
near field communication (NFC)
Which of the following is NOT true of a wireless router?
It is most commonly used in an enterprise setting .