Quiz: Module 10 Wireless Network Attacks and Defenses

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Simiso has been asked to research a new payment system for the retail stores that her company owns. Which technology is predominantly used for contactless payment systems that she will investigate?

b. Near-field communication (NFC)

2
New cards

Muchaneta is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?

d. bluesnarfing

3
New cards

What is a difference between NFC and RFID?

c. NFC requires the sender to be very close to the receiver.

4
New cards

Which of the following attacks transfers the data from one RFID tag to another?

b. RFID cloning

5
New cards

Thubelihle has just been informed that an employee has tried to install their own wireless router in the employee lounge. Why is installing this rogue AP an issue?

b. It allows an attacker to bypass network security configurations.

6
New cards

Zendaya is helping her neighbor install and configure a new wireless router. Her neighbor is reluctant to configure the settings on the device but just wants to accept the default settings. Which of these is NOT a reason Zendaya would give regarding the risks of an improperly configured wireless router?

b. Wireless devices could be susceptible to an INKSPOT attack.

7
New cards

Which of these WPS methods is vulnerable?

b. PIN

8
New cards

Zuri is on vacation and visits a local coffee shop to enjoy a beverage and check her email through the free Wi-Fi. When she first connects, a screen appears asking her to agree to an acceptable use policy (AUP) before continuing. What type of AP portal has she encountered?

d. captive portal

9
New cards

Which of the following is NOT a wireless denial attack that attempts to prevent a user from accessing or using a WLAN?

a. RTS/CTS replay attack

10
New cards

Nia is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is she describing?

b. evil twin attack

11
New cards

Which of these is a vulnerability of MAC address filtering in a WLAN?

d. MAC addresses are initially exchanged unencrypted.

12
New cards

Which of the following is NOT true about cellular networks?

a. Using a cellular network requires extensive security configurations on the part of the user.

13
New cards

Which of the following is NOT true about WLAN versions?

d. WLAN-IEEE 8ax is the final version to be released.

14
New cards

Which of these is the encryption protocol for WPA2?

b. CCMP

15
New cards

Which mode provides the highest level of security?

d. WPA3-Enterprise 192-bit mode

16
New cards

Nala needs to purchase WLCs for the office. What type of AP must she also purchase that can be managed by a WLC?

b. controller AP

17
New cards

Which WPA3 security feature is designed to increase security at the time of the handshake?

b. SAE

18
New cards

Hadiza is explaining the EAP to a new hire. What would be the best explanation of EAP?

b. It is a framework for transporting authentication protocols.

19
New cards

Makena has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?

b. EAP-TLS

20
New cards

Which of these is a WPA3 technology that mitigates against association attacks?

d.PMF