CWNA Chapter 14

40 Questions | Attempts: 123
Share

SettingsSettingsSettings
CWNA Quizzes & Trivia

Questions and Answers
  • 1. 

    What is a potential open and unsecured gateway straight into the wired infrastructure?

    • A.

      Access Point

    • B.

      Rouge Access Point

    • C.

      Port

    • D.

      Firewall

    Correct Answer
    B. Rouge Access Point
  • 2. 

    Any unauthorized WiFi device that is not under proper management is a?

    • A.

      Rouge Access Point

    • B.

      Access Point

    • C.

      Port

    • D.

      Firewall

    Correct Answer
    A. Rouge Access Point
  • 3. 

    What wireless connection also has the potential of providing a rouge access point?

    • A.

      Ethernet

    • B.

      Infrastructure

    • C.

      Ad-Hoc

    • D.

      Fire Wire

    Correct Answer
    C. Ad-Hoc
  • 4. 

    A commonly overlooked risk is the?

    • A.

      DoS

    • B.

      DDoS

    • C.

      Hijacking

    • D.

      Peer-to-Peer Attack

    Correct Answer
    D. Peer-to-Peer Attack
  • 5. 

    What is a feature that blocks wireless clients from communicating with each other?

    • A.

      Client Isolation

    • B.

      Peer-to-Peer Attack

    • C.

      Eavesdropping

    • D.

      DoS

    Correct Answer
    A. Client Isolation
  • 6. 

    Which of the following is another term used to describe client isolation?

    • A.

      Peer-to-peer attack

    • B.

      Interuser bridging

    • C.

      Casual eavesdropping

    • D.

      DoS

    Correct Answer
    B. Interuser bridging
  • 7. 

    What are the two eavesdropping methods?

    • A.

      Casual and ordinary

    • B.

      Malicious and ordinary

    • C.

      Casual and malicious

    • D.

      Malicious and non casual

    Correct Answer
    C. Casual and malicious
  • 8. 

    Casual eavesdropping is sometimes called?

    • A.

      VLAN discovery

    • B.

      WLAN discovery

    • C.

      WAN discovery

    • D.

      WWAN discovery

    Correct Answer
    B. WLAN discovery
  • 9. 

    WLAN discovery tools may use what?

    • A.

      Active scanning

    • B.

      Retro scanning

    • C.

      Port scanning

    • D.

      Passive scanning

    Correct Answer
    D. Passive scanning
  • 10. 

    WLAN discovery is considered harmless and is referred to as?

    • A.

      Free-driving

    • B.

      War-driving

    • C.

      WLAN-driving

    • D.

      Wireless-driving

    Correct Answer
    B. War-driving
  • 11. 

    What is strictly looking for a wireless network while in a moving vehicle?

    • A.

      War-driving

    • B.

      Free-driving

    • C.

      Wireless-driving

    • D.

      WLAN-driving

    Correct Answer
    A. War-driving
  • 12. 

    What is an old technique used by hackers to use modems to scan phone numbers for computer networks?

    • A.

      War-driving

    • B.

      War-Scanning

    • C.

      War-Dialing

    • D.

      War-Searching

    Correct Answer
    C. War-Dialing
  • 13. 

    Most common and original war-driving software tool is a freeware program called?

    • A.

      NetFinder

    • B.

      NetLocator

    • C.

      NetSearch

    • D.

      NetStumbler

    Correct Answer
    D. NetStumbler
  • 14. 

    Unauthorized use of 802.11 protocol analyzers to capture wireless connections is called?

    • A.

      Malicious eavesdropping

    • B.

      Casual eavesdropping

    • C.

      Non casual eavesdropping

    • D.

      Illegal eavesdropping

    Correct Answer
    A. Malicious eavesdropping
  • 15. 

    What does WEP stand for?

    • A.

      Wireless Equivalent Privacy

    • B.

      Wired Equivalent Privacy

    • C.

      Wireless Equivalent Protection

    • D.

      Wired Equivalent Protection

    Correct Answer
    B. Wired Equivalent Privacy
  • 16. 

    WEP keys are how many bits?

    • A.

      30 or 104

    • B.

      50 or 104

    • C.

      40 or 104

    • D.

      60 or 104

    Correct Answer
    C. 40 or 104
  • 17. 

    What was once one of the most commonly deployed 802.1x/EAP solutions?

    • A.

      HEAP

    • B.

      LEAP

    • C.

      MEAP

    • D.

      NEAP

    Correct Answer
    B. LEAP
  • 18. 

    What is a weak authentication method that is vulnerable to a brute force attack?

    • A.

      TSK

    • B.

      WPA

    • C.

      WPA2

    • D.

      PSK

    Correct Answer
    D. PSK
  • 19. 

    What is used with the 4-way handshake to create the final dynamic encryption keys?

    • A.

      PMK

    • B.

      PSK

    • C.

      WPA

    • D.

      WPA2

    Correct Answer
    A. PMK
  • 20. 

    A policy mandating very strong pass phrases of how many characters or more to always be in place?

    • A.

      10

    • B.

      15

    • C.

      20

    • D.

      25

    Correct Answer
    C. 20
  • 21. 

    All 802.11 wireless network cards have a physical address known as a?

    • A.

      WAC address

    • B.

      NAC address

    • C.

      BAC address

    • D.

      MAC address

    Correct Answer
    D. MAC address
  • 22. 

    A MAC address is a hexadecimal number of how many digits?

    • A.

      10

    • B.

      12

    • C.

      15

    • D.

      18

    Correct Answer
    B. 12
  • 23. 

    What is often used as a security mechanism for legacy client devices?

    • A.

      MAC filtering

    • B.

      Port filtering

    • C.

      Firewall filtering

    • D.

      AP filtering

    Correct Answer
    A. MAC filtering
  • 24. 

    Devices can be accessed via a web interface, command line, serial port, console connection, and or?

    • A.

      HTTPS

    • B.

      SMTP

    • C.

      SNMP

    • D.

      MFP

    Correct Answer
    C. SNMP
  • 25. 

    Strong passwords should be used and encrypted login capabilities such as what should be used?

    • A.

      HTTPS

    • B.

      SMTP

    • C.

      SNMP

    • D.

      MFP

    Correct Answer
    A. HTTPS
  • 26. 

    Wireless hijacking is also known as?

    • A.

      Evil brother attack

    • B.

      Evil father attack

    • C.

      Evil twin attack

    • D.

      Evil sister attack

    Correct Answer
    C. Evil twin attack
  • 27. 

    What can be used to force any clients to roam to an Evil Twin AP?

    • A.

      AF Jammer

    • B.

      RF Jammer

    • C.

      GF Jammer

    • D.

      MF Jammer

    Correct Answer
    B. RF Jammer
  • 28. 

    An attack that often generates a lot of press is?

    • A.

      Phishing

    • B.

      DoS

    • C.

      Wireless hijacking

    • D.

      Man in the middle

    Correct Answer
    C. Wireless hijacking
  • 29. 

    Attacker may use a 2nd wireless card with their laptop to execute a?

    • A.

      Man in the middle

    • B.

      DoS

    • C.

      Phishing

    • D.

      Hijacking

    Correct Answer
    A. Man in the middle
  • 30. 

    Attacker may also have web server and captive portal software for what type of attack?

    • A.

      DoS

    • B.

      WiFi Phishing

    • C.

      Hijacking

    • D.

      Man in the Middle

    Correct Answer
    B. WiFi Phishing
  • 31. 

    Attack on the wireless networks that receives the least attention is?

    • A.

      Phishing

    • B.

      Wireless hijacking

    • C.

      DDoS

    • D.

      DoS

    Correct Answer
    D. DoS
  • 32. 

    DoS stands for what?

    • A.

      Distribution of Service

    • B.

      Denial of Service

    • C.

      Destruction of Service

    • D.

      Deletion of Service

    Correct Answer
    B. Denial of Service
  • 33. 

    DoS attacks can occur at what layers of the OSI model?

    • A.

      1 or 4

    • B.

      1 or 3

    • C.

      1 or 2

    • D.

      2 or 3

    Correct Answer
    C. 1 or 2
  • 34. 

    Layer 1 DoS attacks are known as?

    • A.

      RF jamming attacks

    • B.

      MF jamming attacks

    • C.

      AF jamming attacks

    • D.

      GF jamming attacks

    Correct Answer
    A. RF jamming attacks
  • 35. 

    What type of jamming occurs when an attacker uses a signal generator to cause interference in the unlicensed frequency space?

    • A.

      Unintentional

    • B.

      Accidental

    • C.

      Intentional

    • D.

      Harmful

    Correct Answer
    C. Intentional
  • 36. 

    What type of jamming occurs when microwaves and cordless phones cause DoS?

    • A.

      Unintentional

    • B.

      Accidental

    • C.

      Intentional

    • D.

      Harmful

    Correct Answer
    A. Unintentional
  • 37. 

    The best tool to detect any layer 1 interference is a?

    • A.

      Spectrum Detector

    • B.

      Spectrum Analyzer

    • C.

      Spectrum Finder

    • D.

      Spectrum Locator

    Correct Answer
    B. Spectrum Analyzer
  • 38. 

    Which layer of the OSI model has the most common DoS attacks?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
  • 39. 

    802.11w-2009 amendment defines what mechanisms for the prevention of spoofing?

    • A.

      SNMP

    • B.

      SMTP

    • C.

      MFP

    • D.

      HTTPS

    Correct Answer
    C. MFP
  • 40. 

    What is a technique used to manipulate people into divulging confidential information such as passwords?

    • A.

      Wireless hijacking

    • B.

      Phishing

    • C.

      DoS

    • D.

      Social Engineering

    Correct Answer
    D. Social Engineering

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2013
    Quiz Created by
    KillaCadillack
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.