What type of access point is configured by an attacker in such a manner that it mimics an authorized access point quizlet?

Looking for Expert Opinion?

Show

Let us have a look at your work and suggest how to improve it!

Get a Consultant

The current Bluetooth version is Bluetooth 6.

B. False

In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission.

B. False

Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity.

True

RFID is commonly used to transmit information between networked computers.

False

In ad hoc mode, devices can only communicate between themselves and cannot connect to another network.

True

RF signals can be picked up from an open or mis-configured AP.

True

RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.

False

The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.

False

Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.

True

For IEEE WLANs, the maximum transmit power is 200 milliwatts (mW).

True

Bluetooth is an example of what type of technology below?

C. Personal Area Network

What is the maximum range of most Bluetooth 5 devices?

D. 800 ft

What type of radio frequency transmissions are used by Bluetooth devices?

C. Short-range radio

Slave devices that are connected to a piconet and are sending transmissions are known as what?

A. active slave

Piconets in which connections exist between different piconets are known as which of the following terms?

D. scatternet

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

B. Bluejacking

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?

C. Bluesnarfing

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?

A. Access point

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

C. Rogue

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

D. Evil Twin

What is the maximum number of characters that can exist within a SSID name?

D. 32

The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length?

D. 64 bits

Which encryption protocol below is used in the WPA2 standard?

A. AES-CCMP

Which of the following choices is not one of the four types of packets used by EAP?

D. Error

Which option below is responsible for the issuing of EAP request packets?

B. Authenticator

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.

C. EAP-FAST

Select the EAP protocol that uses digital certificates for authentication?

EAP-TLS

Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?

C. PEAP

What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security?

A. captive portal AP

When using AES-CCMP, the AES-256 bit key requires how many rounds?

C. 13

Where does the supplicant send identity information?

C. Authenticator

Select the device that is designed to exclusively monitor the RF frequency for network transmissions?

C. WAP

What encryption protocol is used for WPA2?

C. CCMP

What is the maximum transmission power for IEEE WLANs?

B. 200 milliwatts (mW)

What specific feature on an AP controls how much of the spectrum is available to transfer data?

A. Channel Width

Which direction do access point antennas radiate their signals and where should they be located?

D. all directions and centrally located

What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points?

B. site

Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices and even other autonomous APs?

A. fat APs

Which of the following is the most secure form of IEEE 802.1x authentication

D. Certificate-based authentication

Authentication for WPA Personal is accomplished by using what type of key?

B. PSK

WPA stands for WiFi Protected Access. This authentication method uses different encryption algorithms to encrypt the transport. Therefore, this type of network cannot be forged easily, unlike open networks, and users get privacy. Today, WPA2 is probably the most commonly used method to secure WiFi networks.

What are the services defined by 802.11 I RSN security specification?

The 802.11i RSN security specification defines the following services. Authentication: A protocol is used to define an exchange between a user and an AS that provides mutual authentication and generates temporary keys to be used between the client and the AP over the wireless link.

What are the four types of packets used by EAP?

EAP defines four types of packet: request, response, success and failure. Request packets are issued by the authenticator and they solicit a response packet from the supplicant. Any number of request-response exchanges may be used to complete the authentication.

What are the IEEE 802.11 i phases of operation?

List and briefly describe the 5 IEEE 802.11i phases of operation. a. BSS: Basic service set; ESS: Extended Service Set; DS: Distributed System. A BSS is the smallest configuration of a WLAN, typically consisting of one AP (Access Point) and a dynamic set of mobile stations.

Which authentication and security method should be used on a wireless network quizlet?

Which authentication and security method should be used on a wireless network? 802.1x and WPA2

Which authentication method is commonly used for more secure wireless networks?

WPA2-Enterprise It is far and away the most secure of the common authentication types as each user must be onboarded and identified in the IDP. WPA2-Enterprise requires the use of a secure EAP method to authenticate. The most commonly used include PEAP-MSCHAPv2, EAP-TTLS/PAP, and EAP-TLS.

What is the best security method for Wi-Fi?

WPA2

Why should default security settings be changed when dealing with wireless networking?

Why should default security settings be changed when dealing with wireless networking? Because a hacker can connect to your wireless access point and use the default password.

What does the 802.11 i standard cover?

IEEE 802.11 is used in most home and office networks to allow laptops, printers, smartphones, and other devices to communicate with each other and access the Internet without connecting wires

What does 802.11 I represent?

802.11i is a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards.

What type of wireless security solution is defined by the 802.11 standard?

To give wireless networks an equivalent security level as the wired network, the 802.11 standard defined the Wired Equivalent Privacy (WEP) protocol

What are the different IEEE 802.11i phases of operation?

List and briefly describe the 5 IEEE 802.11i phases of operation. a. BSS: Basic service set; ESS: Extended Service Set; DS: Distributed System. A BSS is the smallest configuration of a WLAN, typically consisting of one AP (Access Point) and a dynamic set of mobile stations.

Which encryption protocol is used in the WPA2 standard?

Advanced Encryption Standard (AES):

Which EAP protocol creates an encrypted channel between the client authentication server?

PEAP. The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates EAP within a potentially encrypted and authenticated Transport Layer Security (TLS) tunnel.

What type of access point is configured by an attacker in such a manner that IT mimics an authorized access point quizlet?

An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP, with the intent to redirect client devices. Which of the following choices is not one of the four types of packets used by EAP?

What type of radio frequency transmissions are used by Bluetooth device?

Instead of transmitting over one frequency within the 2.4 GHz band, Bluetooth radios use a fast frequency-hopping spread spectrum (FHSS) technique, allowing only synchronized receivers to access the transmitted data.

What are different IEEE 802.11 i phases of operation?

List and briefly describe the 5 IEEE 802.11i phases of operation. a. BSS: Basic service set; ESS: Extended Service Set; DS: Distributed System. A BSS is the smallest configuration of a WLAN, typically consisting of one AP (Access Point) and a dynamic set of mobile stations.

Which is the third phase of operation in the IEEE 802.11 i protocol?

Key management

What security areas are addressed by IEEE 802.11 I briefly describe the five IEEE 802.11 i phases of operation?

IEEE 802.11i addresses three security areas:

  • authentication,
  • key management, and.
  • data transfer privacy.

What is IEEE 802.11 and how does it work?

IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and specifications of wireless LANs (WLANs). WiFi or WLAN uses high-frequency radio waves instead of cables for connecting the devices in LAN. Users connected by WLANs can move around within the area of network coverage.

Which authentication method is commonly used for more secure wireless networks quizlet?

WPA stands for WiFi Protected Access. This authentication method uses different encryption algorithms to encrypt the transport. Therefore, this type of network cannot be forged easily, unlike open networks, and users get privacy. Today, WPA2 is probably the most commonly used method to secure WiFi networks.

Which of the following provides security for wireless networks?

CCMP is the most secure encryption method to use to secure a wireless network. Advanced Encryption Standard (AES) AES is a strong encryption algorithm that is widely used in modern day wireless networks.

Which of the following is the most secure protocol for wireless networks?

Which of the following provides security for wireless networks? Wi-Fi protected access (WPA).

What is the best authentication method for wireless?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice.

Which encryption method used on wireless networks is the most secure?

WEP is the least secure wireless encryption type, and WPA2 is the most secure wireless encryption type. WPA2 with AES provides strong security for wireless networks.