Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this? |
A rogue access point |
Which of the following describes marks that attackers place outside a building to identify an open wireless network? |
Warchalking |
The process of walking around an office building with an 802.11 signal detector is known as what? |
Wardriving |
Which of the following describes Bluesnarfing? |
Unauthorized viewing calendar, emails, and messages on a mobile device |
Which of the following sends unsolicited business cards and messages to a Bluetooth device? |
Bluejacking |
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol? |
Disable Bluetooth on the phone |
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?(Select two) |
Bluetooth and 802.11g |
Your organization uses an 802.11g wireless network. Recently, other tenants installed the following equipment in your building:….since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame? |
The wireless TV system |
Which of the following best describes an evil twin? |
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information |
Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing? |
Encryption |
Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack? |
Sniffing |
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution. |
Check the MAC addresses of devices connected to your wired switch and conduct a site survey |
Match the malicious interference type with the appropriate characteristic. |
Spark Jamming = Repeatedly blasts receiving equipment with high-intensity, short-duration RF bursts at a rapid pace Random Noise Jamming = Produces RF signals using random amplitudes and frequencies Random Pulse Jamming = uses radio pulses of random amplitude and frequency |
The attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end-user devices and the reader in the kiosk. She then uses that information later on to masquerade as the original end-user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario? |
NFC Relay Attack |
You are implementing a wireless network in a dentist’s office. The dentist’s practice is small, so you choose an inexpensive, consumer grade access point. While reading the documentation, you notice that the access point supports Wi-Fi protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce the risk? |
Disable WPS in the access point’s configuration |
LABSIM 6.13 Practice Questions
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price