CR2241 - Chapter 8

A visually engaging and informative image that highlights wireless network security, with elements like Wi-Fi icons, locks, and technology motifs.

Wireless Network Security Quiz

Test your knowledge on wireless security technologies, protocols, and vulnerabilities with our comprehensive quiz. This quiz covers essential topics such as NFC, Bluetooth security, Wi-Fi Protected Access, and more!

  • 20 multiple choice questions
  • Immediate feedback on your answers
  • Perfect for students and professionals alike!
20 Questions5 MinutesCreated by CuriousCyber256
Which technology is predominately used for contactless payment systems?
Near field communication (NFC)
Wireless local area network (WLAN)
Bluetooth
Radio Frequency ID (RFID)
Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?
Bluesnarfing
Bluejacking
Bluecreeping
Bluestealing
What is a difference between NFC and RFID?
NFC is based on wireless technology while RFID is not.
RFID is faster than NFC.
RFID is designed for paper-based tags while NFC is not.
NFC devices cannot pair as quickly as RFID devices.
Which of these technologies is NOT found in a wireless router?
Access point
Router
Dynamic host configuration protocol (DHCP) server
Firewall
Why is a rogue AP a security vulnerability?
It uses the weaker IEEE 80211i protocol.
It conflicts with other network firewalls and can cause them to become disabled.
It allows an attacker to bypass network security configurations.
It requires the use of vulnerable wireless probes on all mobile devices. CHAPTER 8 Wireless Network Security 359 Copyright 2018
Which of these is NOT a risk when a home wireless router is not securely configured?
Only a small percentage of the total traffic can be encrypted.
An attacker can steal data from any folder with file sharing enabled.
User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.
Malware can be injected into a computer connected to the WLAN.
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
Push-button method
PIN method
Piconet method
NFC method
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?
Captive portal
Web-based portal
Rogue portal
Authenticated portal
Which of the following is NOT a wireless peripheral protection option?
Update or replacing any vulnerable device
Switch to a more fully tested Bluetooth model
Install a network sensor to detect an attack
Substitute a wired device
The primary design of a(n) _____ is to capture the transmissions from legitimate users.
Rogue access point
WEP
Evil twin
Bluetooth grabber
Which of these is a vulnerability of MAC address filtering?
APs use IP addresses instead of MACs.
The user must enter the MAC.
MAC addresses are initially exchanged unencrypted.
Not all operating systems support MACs.
Which of these is NOT a limitation of turning off the SSID broadcast from an AP?
Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.
Some versions of operating systems favor a network that broadcasts an SSID over one that does not.
Users can more easily roam from one WLAN to another.
The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.
What is the primary weakness of wired equivalent privacy (WEP)?
It functions only on specific brands of APs.
Its usage creates a detectable pattern.
It slows down a WLAN from 104 Mbps to 16 Mbps.
Initialization vectors (IVs) are difficult for users to manage.
WPA replaces WEP with _____.
WPA2
Temporal Key Integrity Protocol (TKIP)
Cyclic redundancy check (CRC)
Message Integrity Check (MIC)
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
Frequency band
Channel selection
RFID spectrum
Channel width
A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?
Controller AP
Standalone AP
Fat AP
Any type of AP can be managed by a WLC.
AES-CCMP is the encryption protocol standard used in _____ .
WPA
WPA2
IEEE 802.11
NFC
Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?
It is the transport protocol used in TCP/IP for authentication.
It is a framework for transporting authentication protocols.
It is a subset of WPA2
It is a technology used by IEEE 802.11 for encryption.
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
EAP-TLS
EAP-TTLS
EAP-SSL
EAP-FAST
Which of these is NOT a type of wireless AP probe?
Wireless device probe
WNIC probe
Dedicated probe
AP probe
{"name":"CR2241 - Chapter 8", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on wireless security technologies, protocols, and vulnerabilities with our comprehensive quiz. This quiz covers essential topics such as NFC, Bluetooth security, Wi-Fi Protected Access, and more!20 multiple choice questionsImmediate feedback on your answersPerfect for students and professionals alike!","img":"https:/images/course6.png"}
Powered by: Quiz Maker