1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Simiso has been asked to research a new payment system for the retail stores that her company owns. Which technology is predominantly used for contactless payment systems that she will investigate?
b. Near-field communication (NFC)
Muchaneta is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?
d. bluesnarfing
What is a difference between NFC and RFID?
c. NFC requires the sender to be very close to the receiver.
Which of the following attacks transfers the data from one RFID tag to another?
b. RFID cloning
Thubelihle has just been informed that an employee has tried to install their own wireless router in the employee lounge. Why is installing this rogue AP an issue?
b. It allows an attacker to bypass network security configurations.
Zendaya is helping her neighbor install and configure a new wireless router. Her neighbor is reluctant to configure the settings on the device but just wants to accept the default settings. Which of these is NOT a reason Zendaya would give regarding the risks of an improperly configured wireless router?
b. Wireless devices could be susceptible to an INKSPOT attack.
Which of these WPS methods is vulnerable?
b. PIN
Zuri is on vacation and visits a local coffee shop to enjoy a beverage and check her email through the free Wi-Fi. When she first connects, a screen appears asking her to agree to an acceptable use policy (AUP) before continuing. What type of AP portal has she encountered?
d. captive portal
Which of the following is NOT a wireless denial attack that attempts to prevent a user from accessing or using a WLAN?
a. RTS/CTS replay attack
Nia is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is she describing?
b. evil twin attack
Which of these is a vulnerability of MAC address filtering in a WLAN?
d. MAC addresses are initially exchanged unencrypted.
Which of the following is NOT true about cellular networks?
a. Using a cellular network requires extensive security configurations on the part of the user.
Which of the following is NOT true about WLAN versions?
d. WLAN-IEEE 8ax is the final version to be released.
Which of these is the encryption protocol for WPA2?
b. CCMP
Which mode provides the highest level of security?
d. WPA3-Enterprise 192-bit mode
Nala needs to purchase WLCs for the office. What type of AP must she also purchase that can be managed by a WLC?
b. controller AP
Which WPA3 security feature is designed to increase security at the time of the handshake?
b. SAE
Hadiza is explaining the EAP to a new hire. What would be the best explanation of EAP?
b. It is a framework for transporting authentication protocols.
Makena has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
b. EAP-TLS
Which of these is a WPA3 technology that mitigates against association attacks?
d.PMF