Chapter 7 test 2

1) In the TJX breach, attackers first got into the network through ________.
A) spear phishing
B) an inside conspirator
C) the use of weak wireless encryption
D) all of the above
C
2) Wireless LAN standards come from ________.
A) OSI
B) TCP/IP
C) both A and B
D) neither A nor B
A
3) To drive around a city looking for working access points that are unprotected is ________.
A) drive-by hacking
B) war driving
B
4) Breaking into WLANs from outside the premises is ________.
A) drive-by hacking
B) war driving
A
5) 802.11i provides ________.
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B
C
6) In 802.11i, protection is provided between the client and the ________.
A) access point
B) switch
C) router
D) server
A
7) Which 802 working group created 802.11i?
A) 802.1
B) 802.3
C) 802.11
D) It was not an 802 working group. It was the Wi-Fi Alliance
C
8) Which offers stronger security?
A) WPA
B) 802.11i
C) Both A and B offer equally strong security.
B
9) What is the strongest security protocol for 802.11 today?
A) 802.11i
B) 802.11s
C) 802.11X
D) WPA
A
10) In what mode of 802.11i operation is a central authentication server used?
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B
A
11) In 802.11i ________, hosts must know a shared initial key.
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B
B
12) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key.
A) VPN
B) session
C) 802.1X
D) preshared
B
13) After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.
A) the preshared key
B) an 802.1X key
C) WPS keys
D) different session keys
D
14) For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication.
A) always use the same preshared key each time it is connected
B) always use the same session key each time it is connected
C) both A and B
D) neither A nor B
D
15) Session keys are used to ________.
A) make cryptanalysis more difficult
B) improve authentication
C) both A and B
D) neither A nor B
A
16) Which of the following is a risk in 802.11i PSK mode?
A) WPS can easily be cracked if it is used.
B) Unauthorized sharing of the pre-shared key.
C) A weak passphrase may be selected.
D) all of the above
D
17) In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
A) 8
B) 12
C) 20
D) 128
C
18) Part of WPS weakness is caused by ________.
A) 802.1X mode
B) WPA2 preshared key mode
C) dividing the 8 digit PIN into two 4 digit halves
D) IPsec
C
19) Which of the following has a dangerous vulnerability that is causing problems today?
A) PEAP
B) 802.11i
C) WPA
D) WPS
D
20) If a firm has many access points, it should use ________ mode in 802.11i.
A) PSK
B) 802.1X
C) IPsec
D) PEAP
B
21) The Wi-Fi Alliance calls 802.1X mode ________ mode.
A) enterprise
B) personal
C) WEP
D) WPA
A
22) In ________, the authenticator is the ________.
A) 802.1X, wireless access point
B) 802.11i, switch
C) 802.11i, wireless access point
D) 802.1X, central authentication server
C
23) 802.1X requires security between the supplicant and the authenticator in ________.
A) Ethernet
B) 802.11
C) both A and B
D) neither A nor B
B
24) An unauthorized internal access point is a(n) ________ access point.
A) evil twin
B) rogue
C) shadow
D) counterfeit
B
25) A rogue access point is created by ________.
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin
A
26) A rogue access point ________.
A) is an unauthorized internal access point
B) often has very poor security
C) often operates at high power
D) All of the above are true.
D
27) A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point
A
28) Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
B
29) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
A) one
B) two
C) four
D) 16
B
30) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
A) VLANs
B) VPNs
C) PEAP
D) 802.1X mode
B
31) In VPNs designed to frustrate evil twin attacks, the shared secret ________.
A) is transmitted in the clear
B) is transmitted with cryptographic protections
C) is not transmitted
D) Any of the above.
C
32) Centralized access point management ________.
A) increases management costs but provides better control
B) reduces management costs
B
33) Managed access points should ________.
A) allow access point power to be adjusted remotely
B) provide constant transmission quality monitoring
C) both A and B
D) neither A nor B
C
34) Managed access points should ________.
A) identify rogue access points
B) be able to push updates out to access points
C) both A and B
D) neither A nor B
C
35) Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)2
C) Log10(P2/P1)
D) none of the above
D
36) An 8/1 increase in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 20
D) none of the above
D
37) A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 9
D) none of the above
C
38) A 100/1 increase in power corresponds to approximately ________ decibels.
A) 6
B) 10
C) 20
D) none of the above
C
39) 1 Watt represents a dBm value of about ________.
A) 10
B) 20
C) 30
D) We cannot say because only one power is given.
C
40) A radio that has a power of 8 mW represents a ratio of about ________ dBm.
A) 2
B) 8
C) 9
D) 10
C
41) I wish to have a wireless LAN to serve my house. I will use ________.
A) 802.11
B) Bluetooth
C) either A or B
A
42) Bluetooth is for ________.
A) large WLANs
B) cable replacement
C) both A and B
D) neither A nor B
B
43) Which of the following was created for PANs?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
B
44) Bluetooth is standardized by the ________.
A) 802.11 Working Group
B) Wi-Fi Alliance
C) Bluetooth Special Interest Group
D) none of the above
C
45) Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) personal Bluetooth
D) none of the above
A
46) Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) enterprise Bluetooth
D) none of the above
B
47) Which of the following can use access points?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
A
48) In Bluetooth, a master can have up to ________ slaves at any moment.
A) 1
B) 3
C) 12
D) none of the above
D
49) At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?
A) the Bluetooth phone
B) the Bluetooth headset
C) Both are simultaneously masters and slaves.
B
50) Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A) Bluetooth input profile
B) Bluetooth I/O profile
C) human interface device profile
D) none of the above
C
51) Near-field communication has a maximum transmission distance of about ________.
A) 400 cm/200 in
B) 40 cm/20 in
C) 4 cm/2 in
D) The devices must be physically touching.
C
52) In which frequency band does NFC operate?
A) 2.4 GHz
B) 5 GHz
C) both A and B
D) neither A nor B
D
53) Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) none of the above
D
54) Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) the scanning unit
D
55) Which of the following uses an access point?
A) traditional Wi-Fi
B) Wi-Fi Direct
C) both A and B
D) neither A nor B
A