Wireless Security

Which of the answers listed below refers to a solution allowing administrators to block Internet access for users until they perform required action? Captive portal

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. True

What are the characteristic features of WPA/WPA2 Enterprise mode? Suitable for large corporate networks, Requires RADIUS authentication server

Which of the following would be the best solution for securing a small network lacking an authentication server? WPA2-PSK

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. True

Which of the EAP methods listed below relies on client-side and server-side certificates to perform authentication? EAP-TLS

Which of the following EAP methods offers the highest level of security? EAP-TLS

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as: TKIP

AES-based encryption mode implemented in WPA2 is known as: CCMP

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. True

A wireless disassociation attack is a type of: Denial of Service (Dos) attacker

What is the name of a technology used for contactless payment transactions? NFC

Which of the following wireless technologies enables identification and tracking of tags attached to objects? RFID

Gaining unauthorized access to a Bluetooth device is referred to as: Bluesnarfing

The practice of sending unsolicited messages over Bluetooth is called: Bluejacking

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? WPS, WEP

A wireless jamming attack is a type of: Denial of Service (Dos) attacker

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts. True

A type of wireless attack designed to exploit vulnerabilities of WEP is known as: IV attack

Which of the following security protocols is the least susceptible to wireless replay attacks? WPA2-CCMP