CWNA Chapter 14

40 Questions | Attempts: 123
Share
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. DoS stands for what?
Submit
Please wait...
About This Quiz
CWNA Quizzes & Trivia

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Any unauthorized WiFi device that is not under proper management is a?
Submit
3. The best tool to detect any layer 1 interference is a?
Submit
4. All 802.11 wireless network cards have a physical address known as a?
Submit
5. What can be used to force any clients to roam to an Evil Twin AP?
Submit
6. Unauthorized use of 802.11 protocol analyzers to capture wireless connections is called?
Submit
7. Wireless hijacking is also known as?
Submit
8. What is often used as a security mechanism for legacy client devices?
Submit
9. Strong passwords should be used and encrypted login capabilities such as what should be used?
Submit
10. Layer 1 DoS attacks are known as?
Submit
11. What wireless connection also has the potential of providing a rouge access point?
Submit
12. What type of jamming occurs when microwaves and cordless phones cause DoS?
Submit
13. What is a feature that blocks wireless clients from communicating with each other?
Submit
14. Casual eavesdropping is sometimes called?
Submit
15. What is strictly looking for a wireless network while in a moving vehicle?
Submit
16. Attacker may use a 2nd wireless card with their laptop to execute a?
Submit
17. What was once one of the most commonly deployed 802.1x/EAP solutions?
Submit
18. WLAN discovery is considered harmless and is referred to as?
Submit
19. What is an old technique used by hackers to use modems to scan phone numbers for computer networks?
Submit
20. What type of jamming occurs when an attacker uses a signal generator to cause interference in the unlicensed frequency space?
Submit
21. What is a technique used to manipulate people into divulging confidential information such as passwords?
Submit
22. What are the two eavesdropping methods?
Submit
23. A MAC address is a hexadecimal number of how many digits?
Submit
24. What is a potential open and unsecured gateway straight into the wired infrastructure?
Submit
25. WEP keys are how many bits?
Submit
26. DoS attacks can occur at what layers of the OSI model?
Submit
27. Which layer of the OSI model has the most common DoS attacks?
Submit
28. A policy mandating very strong pass phrases of how many characters or more to always be in place?
Submit
29. Most common and original war-driving software tool is a freeware program called?
Submit
30. What is used with the 4-way handshake to create the final dynamic encryption keys?
Submit
31. Devices can be accessed via a web interface, command line, serial port, console connection, and or?
Submit
32. WLAN discovery tools may use what?
Submit
33. An attack that often generates a lot of press is?
Submit
34. A commonly overlooked risk is the?
Submit
35. Which of the following is another term used to describe client isolation?
Submit
36. 802.11w-2009 amendment defines what mechanisms for the prevention of spoofing?
Submit
37. What does WEP stand for?
Submit
38. Attacker may also have web server and captive portal software for what type of attack?
Submit
39. Attack on the wireless networks that receives the least attention is?
Submit
40. What is a weak authentication method that is vulnerable to a brute force attack?
Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2013
    Quiz Created by
    KillaCadillack
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
DoS stands for what?
Any unauthorized WiFi device that is not under proper management is a?
The best tool to detect any layer 1 interference is a?
All 802.11 wireless network cards have a physical address known as a?
What can be used to force any clients to roam to an Evil Twin AP?
Unauthorized use of 802.11 protocol analyzers to capture wireless...
Wireless hijacking is also known as?
What is often used as a security mechanism for legacy client devices?
Strong passwords should be used and encrypted login capabilities such...
Layer 1 DoS attacks are known as?
What wireless connection also has the potential of providing a rouge...
What type of jamming occurs when microwaves and cordless phones cause...
What is a feature that blocks wireless clients from communicating with...
Casual eavesdropping is sometimes called?
What is strictly looking for a wireless network while in a moving...
Attacker may use a 2nd wireless card with their laptop to execute a?
What was once one of the most commonly deployed 802.1x/EAP solutions?
WLAN discovery is considered harmless and is referred to as?
What is an old technique used by hackers to use modems to scan phone...
What type of jamming occurs when an attacker uses a signal generator...
What is a technique used to manipulate people into divulging...
What are the two eavesdropping methods?
A MAC address is a hexadecimal number of how many digits?
What is a potential open and unsecured gateway straight into the wired...
WEP keys are how many bits?
DoS attacks can occur at what layers of the OSI model?
Which layer of the OSI model has the most common DoS attacks?
A policy mandating very strong pass phrases of how many characters or...
Most common and original war-driving software tool is a freeware...
What is used with the 4-way handshake to create the final dynamic...
Devices can be accessed via a web interface, command line, serial...
WLAN discovery tools may use what?
An attack that often generates a lot of press is?
A commonly overlooked risk is the?
Which of the following is another term used to describe client...
802.11w-2009 amendment defines what mechanisms for the prevention of...
What does WEP stand for?
Attacker may also have web server and captive portal software for what...
Attack on the wireless networks that receives the least attention is?
What is a weak authentication method that is vulnerable to a brute...
Alert!

Advertisement