Deck 7: Wireless Lans 2

Full screen (f)
exit full mode
Question
After two wireless clients authenticate themselves via PSK to an access point,they will use ________ to communicate with the access point.

A)the preshared key
B)an 802.1X key
C)WPS keys
D)different session keys
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following has a dangerous vulnerability that is causing problems today?

A)PEAP
B)802.11i
C)WPA
D)WPS
Question
In the TJX breach,attackers first got into the network through ________.

A)spear phishing
B)an inside conspirator
C)the use of weak wireless encryption
D)all of the above
Question
Session keys are used to ________.

A)make cryptanalysis more difficult
B)improve authentication
C)both A and B
D)neither A nor B
Question
After authentication in 80.11i PSK mode,a wireless client communicates with the access point via a(n)________ key.

A)VPN
B)session
C)802.1X
D)preshared
Question
In what mode of 802.11i operation is a central authentication server used?

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Question
Which 802 working group created 802.11i?

A)802.1
B)802.3
C)802.11
D)It was not an 802 working group. It was the Wi-Fi Alliance
Question
In 802.11i,protection is provided between the client and the ________.

A)access point
B)switch
C)router
D)server
Question
In 802.11i ________,hosts must know a shared initial key.

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Question
Breaking into WLANs from outside the premises is ________.

A)drive-by hacking
B)war driving
Question
What is the strongest security protocol for 802.11 today?

A)802.11i
B)802.11s
C)802.11X
D)WPA
Question
To drive around a city looking for working access points that are unprotected is ________.

A)drive-by hacking
B)war driving
Question
Wireless LAN standards come from ________.

A)OSI
B)TCP/IP
C)both A and B
D)neither A nor B
Question
Which offers stronger security?

A)WPA
B)802.11i
C)Both A and B offer equally strong security.
Question
802.11i provides ________.

A)confidentiality
B)message integrity
C)both A and B
D)neither A nor B
Question
For post-authentication communication with an access point,the client in 802.11i PSK mode will ________ for subsequent communication.

A)always use the same preshared key each time it is connected
B)always use the same session key each time it is connected
C)both A and B
D)neither A nor B
Question
Part of WPS weakness is caused by ________.

A)802.1X mode
B)WPA2 preshared key mode
C)dividing the 8 digit PIN into two 4 digit halves
D)IPsec
Question
In 802.11i PSK mode,the pass phrase should be at least ________ characters long.

A)8
B)12
C)20
D)128
Question
Which of the following is a risk in 802.11i PSK mode?

A)WPS can easily be cracked if it is used.
B)Unauthorized sharing of the pre-shared key.
C)A weak passphrase may be selected.
D)all of the above
Question
If a firm has many access points,it should use ________ mode in 802.11i.

A)PSK
B)802.1X
C)IPsec
D)PEAP
Question
In VPNs designed to frustrate evil twin attacks,the shared secret ________.

A)is transmitted in the clear
B)is transmitted with cryptographic protections
C)is not transmitted
D)Any of the above.
Question
Managed access points should ________.

A)allow access point power to be adjusted remotely
B)provide constant transmission quality monitoring
C)both A and B
D)neither A nor B
Question
Managed access points should ________.

A)identify rogue access points
B)be able to push updates out to access points
C)both A and B
D)neither A nor B
Question
802.1X requires security between the supplicant and the authenticator in ________.

A)Ethernet
B)802.11
C)both A and B
D)neither A nor B
Question
A 100/1 increase in power corresponds to approximately ________ decibels.

A)6
B)10
C)20
D)none of the above
Question
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

A)VLANs
B)VPNs
C)PEAP
D)802.1X mode
Question
An unauthorized internal access point is a(n)________ access point.

A)evil twin
B)rogue
C)shadow
D)counterfeit
Question
1 Watt represents a dBm value of about ________.

A)10
B)20
C)30
D)We cannot say because only one power is given.
Question
Which is the correct formula for decibels?

A)10 * P2/P1
B)10 * (P2/P1)2
C)Log10(P2/P1)
D)none of the above
Question
The Wi-Fi Alliance calls 802.1X mode ________ mode.

A)enterprise
B)personal
C)WEP
D)WPA
Question
Which of the following is usually set up by a hacker outside the building?

A)a rogue access point
B)an evil twin access point
C)both A and B
D)neither A nor B
Question
A rogue access point ________.

A)is an unauthorized internal access point
B)often has very poor security
C)often operates at high power
D)All of the above are true.
Question
A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.

A)3
B)6
C)9
D)none of the above
Question
If a company uses 802.11i for its core security protocol,an evil twin access point will set up ________ 802.11i connection(s).

A)one
B)two
C)four
D)16
Question
A notebook computer configured to act like a real access point is a(n)________.

A)evil twin access point
B)rogue access point
Question
An 8/1 increase in power corresponds to approximately ________ decibels.

A)3
B)6
C)20
D)none of the above
Question
A rogue access point is created by ________.

A)an employee
B)an external attacker
C)the IT security department
D)an evil twin
Question
Centralized access point management ________.

A)increases management costs but provides better control
B)reduces management costs
Question
A radio that has a power of 8 mW represents a ratio of about ________ dBm.

A)2
B)8
C)9
D)10
Question
In ________,the authenticator is the ________.

A)802.1X, wireless access point
B)802.11i, switch
C)802.11i, wireless access point
D)802.1X, central authentication server
Question
Which of the following was created for PANs?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Question
Which form of Bluetooth has a typical transmission speed of about 24 Mbps?

A)classic Bluetooth
B)high-speed Bluetooth
C)enterprise Bluetooth
D)none of the above
Question
Which of the following uses an access point?

A)traditional Wi-Fi
B)Wi-Fi Direct
C)both A and B
D)neither A nor B
Question
I wish to have a wireless LAN to serve my house.I will use ________.

A)802.11
B)Bluetooth
C)either A or B
Question
Passive RFID chips are powered by ________.

A)a battery
B)the sun
C)body temperature
D)none of the above
Question
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile,which device is initially the master?

A)the Bluetooth phone
B)the Bluetooth headset
C)Both are simultaneously masters and slaves.
Question
Passive RFID chips are powered by ________.

A)a battery
B)the sun
C)body temperature
D)the scanning unit
Question
Which of the following can use access points?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Question
In which frequency band does NFC operate?

A)2)4 GHz
B)5 GHz
C)both A and B
D)neither A nor B
Question
Bluetooth is for ________.

A)large WLANs
B)cable replacement
C)both A and B
D)neither A nor B
Question
Near-field communication has a maximum transmission distance of about ________.

A)400 cm/200 in
B)40 cm/20 in
C)4 cm/2 in
D)The devices must be physically touching.
Question
In Bluetooth,a master can have up to ________ slaves at any moment.

A)1
B)3
C)12
D)none of the above
Question
Which Bluetooth profile would a desktop use with a Bluetooth keyboard?

A)Bluetooth input profile
B)Bluetooth I/O profile
C)human interface device profile
D)none of the above
Question
Bluetooth is standardized by the ________.

A)802.11 Working Group
B)Wi-Fi Alliance
C)Bluetooth Special Interest Group
D)none of the above
Question
Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?

A)classic Bluetooth
B)high-speed Bluetooth
C)personal Bluetooth
D)none of the above
Question
In NFC,an attacker several meters away cannot read the transaction.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/56
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Wireless Lans 2
1
After two wireless clients authenticate themselves via PSK to an access point,they will use ________ to communicate with the access point.

A)the preshared key
B)an 802.1X key
C)WPS keys
D)different session keys
D
2
Which of the following has a dangerous vulnerability that is causing problems today?

A)PEAP
B)802.11i
C)WPA
D)WPS
D
3
In the TJX breach,attackers first got into the network through ________.

A)spear phishing
B)an inside conspirator
C)the use of weak wireless encryption
D)all of the above
C
4
Session keys are used to ________.

A)make cryptanalysis more difficult
B)improve authentication
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
5
After authentication in 80.11i PSK mode,a wireless client communicates with the access point via a(n)________ key.

A)VPN
B)session
C)802.1X
D)preshared
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
6
In what mode of 802.11i operation is a central authentication server used?

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
7
Which 802 working group created 802.11i?

A)802.1
B)802.3
C)802.11
D)It was not an 802 working group. It was the Wi-Fi Alliance
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
8
In 802.11i,protection is provided between the client and the ________.

A)access point
B)switch
C)router
D)server
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
9
In 802.11i ________,hosts must know a shared initial key.

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
10
Breaking into WLANs from outside the premises is ________.

A)drive-by hacking
B)war driving
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
11
What is the strongest security protocol for 802.11 today?

A)802.11i
B)802.11s
C)802.11X
D)WPA
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
12
To drive around a city looking for working access points that are unprotected is ________.

A)drive-by hacking
B)war driving
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
13
Wireless LAN standards come from ________.

A)OSI
B)TCP/IP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
14
Which offers stronger security?

A)WPA
B)802.11i
C)Both A and B offer equally strong security.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
15
802.11i provides ________.

A)confidentiality
B)message integrity
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
16
For post-authentication communication with an access point,the client in 802.11i PSK mode will ________ for subsequent communication.

A)always use the same preshared key each time it is connected
B)always use the same session key each time it is connected
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
17
Part of WPS weakness is caused by ________.

A)802.1X mode
B)WPA2 preshared key mode
C)dividing the 8 digit PIN into two 4 digit halves
D)IPsec
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
18
In 802.11i PSK mode,the pass phrase should be at least ________ characters long.

A)8
B)12
C)20
D)128
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a risk in 802.11i PSK mode?

A)WPS can easily be cracked if it is used.
B)Unauthorized sharing of the pre-shared key.
C)A weak passphrase may be selected.
D)all of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
20
If a firm has many access points,it should use ________ mode in 802.11i.

A)PSK
B)802.1X
C)IPsec
D)PEAP
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
21
In VPNs designed to frustrate evil twin attacks,the shared secret ________.

A)is transmitted in the clear
B)is transmitted with cryptographic protections
C)is not transmitted
D)Any of the above.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
22
Managed access points should ________.

A)allow access point power to be adjusted remotely
B)provide constant transmission quality monitoring
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
23
Managed access points should ________.

A)identify rogue access points
B)be able to push updates out to access points
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
24
802.1X requires security between the supplicant and the authenticator in ________.

A)Ethernet
B)802.11
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
25
A 100/1 increase in power corresponds to approximately ________ decibels.

A)6
B)10
C)20
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

A)VLANs
B)VPNs
C)PEAP
D)802.1X mode
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
27
An unauthorized internal access point is a(n)________ access point.

A)evil twin
B)rogue
C)shadow
D)counterfeit
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
28
1 Watt represents a dBm value of about ________.

A)10
B)20
C)30
D)We cannot say because only one power is given.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
29
Which is the correct formula for decibels?

A)10 * P2/P1
B)10 * (P2/P1)2
C)Log10(P2/P1)
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
30
The Wi-Fi Alliance calls 802.1X mode ________ mode.

A)enterprise
B)personal
C)WEP
D)WPA
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is usually set up by a hacker outside the building?

A)a rogue access point
B)an evil twin access point
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
32
A rogue access point ________.

A)is an unauthorized internal access point
B)often has very poor security
C)often operates at high power
D)All of the above are true.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
33
A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.

A)3
B)6
C)9
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
34
If a company uses 802.11i for its core security protocol,an evil twin access point will set up ________ 802.11i connection(s).

A)one
B)two
C)four
D)16
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
35
A notebook computer configured to act like a real access point is a(n)________.

A)evil twin access point
B)rogue access point
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
36
An 8/1 increase in power corresponds to approximately ________ decibels.

A)3
B)6
C)20
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
37
A rogue access point is created by ________.

A)an employee
B)an external attacker
C)the IT security department
D)an evil twin
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
38
Centralized access point management ________.

A)increases management costs but provides better control
B)reduces management costs
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
39
A radio that has a power of 8 mW represents a ratio of about ________ dBm.

A)2
B)8
C)9
D)10
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
40
In ________,the authenticator is the ________.

A)802.1X, wireless access point
B)802.11i, switch
C)802.11i, wireless access point
D)802.1X, central authentication server
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following was created for PANs?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
42
Which form of Bluetooth has a typical transmission speed of about 24 Mbps?

A)classic Bluetooth
B)high-speed Bluetooth
C)enterprise Bluetooth
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following uses an access point?

A)traditional Wi-Fi
B)Wi-Fi Direct
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
44
I wish to have a wireless LAN to serve my house.I will use ________.

A)802.11
B)Bluetooth
C)either A or B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
45
Passive RFID chips are powered by ________.

A)a battery
B)the sun
C)body temperature
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
46
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile,which device is initially the master?

A)the Bluetooth phone
B)the Bluetooth headset
C)Both are simultaneously masters and slaves.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
47
Passive RFID chips are powered by ________.

A)a battery
B)the sun
C)body temperature
D)the scanning unit
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following can use access points?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
49
In which frequency band does NFC operate?

A)2)4 GHz
B)5 GHz
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
50
Bluetooth is for ________.

A)large WLANs
B)cable replacement
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
51
Near-field communication has a maximum transmission distance of about ________.

A)400 cm/200 in
B)40 cm/20 in
C)4 cm/2 in
D)The devices must be physically touching.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
52
In Bluetooth,a master can have up to ________ slaves at any moment.

A)1
B)3
C)12
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
53
Which Bluetooth profile would a desktop use with a Bluetooth keyboard?

A)Bluetooth input profile
B)Bluetooth I/O profile
C)human interface device profile
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
54
Bluetooth is standardized by the ________.

A)802.11 Working Group
B)Wi-Fi Alliance
C)Bluetooth Special Interest Group
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
55
Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?

A)classic Bluetooth
B)high-speed Bluetooth
C)personal Bluetooth
D)none of the above
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
56
In NFC,an attacker several meters away cannot read the transaction.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 56 flashcards in this deck.