Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP. |
False |
Bluetooth devices are not backward compatible with previous versions. |
False |
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV. |
True |
An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP, with the intent to redirect client devices. |
True |
Which of the following choices is not one of the four types of packets used by EAP? Request |
Error |
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? Gateway access point |
Captive portal access point |
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: EAP-MSCHAPv2 |
EAP-FAST |
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length? 24 bits |
48 bits |
That proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? |
Lightweight EAP (LEAP) |
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? |
Rogue Access Point |
Which option below is responsible for the issuing of EAP request packets? supplicant |
authenticator |
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? |
evil twin |
Which encryption protocol below is used in the WPA2 standard? AES-CCMP |
AES-CCMP |
When using AES-CCMP, the AES-256 bit key requires how many rounds? 4 |
13 |
Slave devices that are connected to a piconet and are sending transmissions are known as what? Active slave |
Active slave |
Piconets in which connections exist between different piconets are known as a: broadnet |
scatternet |
What is the maximum number of characters that can exist within an SSID name? |
32 |
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? |
bluesnarfing |
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? TKIP |
PEAP |
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?
Bluetooth v2.1 |
Bluetooth v1.2 |
Bluetooth is an example of what type of technology below? Small Area Network |
PAN |
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? |
Blue jacking |
What is the maximum range of most Bluetooth devices? |
33ft |
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? |
Access Point |
A 24-bit value used in WEP that changes each time a packet is encrypted. |
Initialization vector (IV) |
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring. |
RF jamming |
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity |
Near Field Communication (NFC) |
An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs. |
WPS |
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities. |
Wired Equivalent Privacy (WEP) |
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection |
bluesnarfing |
Searching for wireless signals from an automobile or on foot using a portable computing device |
war driving |
The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating. |
preshare key (PSK) |
An attack that sends unsolicited messages to Bluetooth-enabled devices |
blue jacking |
The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security. |
WPA2 |
SEC110_ Chapter 9
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price