CWNA Chapter 14

40 Questions | Attempts: 123
Share
SettingsSettings
Please wait...
  • 1/40 Questions

    DoS stands for what?

    • Distribution of Service
    • Denial of Service
    • Destruction of Service
    • Deletion of Service
Please wait...

Quiz Preview

  • 2. 

    Any unauthorized WiFi device that is not under proper management is a?

    • Rouge Access Point

    • Access Point

    • Port

    • Firewall

    Correct Answer
    A. Rouge Access Point
  • 3. 

    The best tool to detect any layer 1 interference is a?

    • Spectrum Detector

    • Spectrum Analyzer

    • Spectrum Finder

    • Spectrum Locator

    Correct Answer
    A. Spectrum Analyzer
  • 4. 

    All 802.11 wireless network cards have a physical address known as a?

    • WAC address

    • NAC address

    • BAC address

    • MAC address

    Correct Answer
    A. MAC address
  • 5. 

    What can be used to force any clients to roam to an Evil Twin AP?

    • AF Jammer

    • RF Jammer

    • GF Jammer

    • MF Jammer

    Correct Answer
    A. RF Jammer
  • 6. 

    Unauthorized use of 802.11 protocol analyzers to capture wireless connections is called?

    • Malicious eavesdropping

    • Casual eavesdropping

    • Non casual eavesdropping

    • Illegal eavesdropping

    Correct Answer
    A. Malicious eavesdropping
  • 7. 

    Wireless hijacking is also known as?

    • Evil brother attack

    • Evil father attack

    • Evil twin attack

    • Evil sister attack

    Correct Answer
    A. Evil twin attack
  • 8. 

    What is often used as a security mechanism for legacy client devices?

    • MAC filtering

    • Port filtering

    • Firewall filtering

    • AP filtering

    Correct Answer
    A. MAC filtering
  • 9. 

    Strong passwords should be used and encrypted login capabilities such as what should be used?

    • HTTPS

    • SMTP

    • SNMP

    • MFP

    Correct Answer
    A. HTTPS
  • 10. 

    Layer 1 DoS attacks are known as?

    • RF jamming attacks

    • MF jamming attacks

    • AF jamming attacks

    • GF jamming attacks

    Correct Answer
    A. RF jamming attacks
  • 11. 

    What wireless connection also has the potential of providing a rouge access point?

    • Ethernet

    • Infrastructure

    • Ad-Hoc

    • Fire Wire

    Correct Answer
    A. Ad-Hoc
  • 12. 

    What type of jamming occurs when microwaves and cordless phones cause DoS?

    • Unintentional

    • Accidental

    • Intentional

    • Harmful

    Correct Answer
    A. Unintentional
  • 13. 

    What is a feature that blocks wireless clients from communicating with each other?

    • Client Isolation

    • Peer-to-Peer Attack

    • Eavesdropping

    • DoS

    Correct Answer
    A. Client Isolation
  • 14. 

    Casual eavesdropping is sometimes called?

    • VLAN discovery

    • WLAN discovery

    • WAN discovery

    • WWAN discovery

    Correct Answer
    A. WLAN discovery
  • 15. 

    What is strictly looking for a wireless network while in a moving vehicle?

    • War-driving

    • Free-driving

    • Wireless-driving

    • WLAN-driving

    Correct Answer
    A. War-driving
  • 16. 

    Attacker may use a 2nd wireless card with their laptop to execute a?

    • Man in the middle

    • DoS

    • Phishing

    • Hijacking

    Correct Answer
    A. Man in the middle
  • 17. 

    What was once one of the most commonly deployed 802.1x/EAP solutions?

    • HEAP

    • LEAP

    • MEAP

    • NEAP

    Correct Answer
    A. LEAP
  • 18. 

    WLAN discovery is considered harmless and is referred to as?

    • Free-driving

    • War-driving

    • WLAN-driving

    • Wireless-driving

    Correct Answer
    A. War-driving
  • 19. 

    What is an old technique used by hackers to use modems to scan phone numbers for computer networks?

    • War-driving

    • War-Scanning

    • War-Dialing

    • War-Searching

    Correct Answer
    A. War-Dialing
  • 20. 

    What type of jamming occurs when an attacker uses a signal generator to cause interference in the unlicensed frequency space?

    • Unintentional

    • Accidental

    • Intentional

    • Harmful

    Correct Answer
    A. Intentional
  • 21. 

    What is a technique used to manipulate people into divulging confidential information such as passwords?

    • Wireless hijacking

    • Phishing

    • DoS

    • Social Engineering

    Correct Answer
    A. Social Engineering
  • 22. 

    What are the two eavesdropping methods?

    • Casual and ordinary

    • Malicious and ordinary

    • Casual and malicious

    • Malicious and non casual

    Correct Answer
    A. Casual and malicious
  • 23. 

    A MAC address is a hexadecimal number of how many digits?

    • 10

    • 12

    • 15

    • 18

    Correct Answer
    A. 12
  • 24. 

    What is a potential open and unsecured gateway straight into the wired infrastructure?

    • Access Point

    • Rouge Access Point

    • Port

    • Firewall

    Correct Answer
    A. Rouge Access Point
  • 25. 

    WEP keys are how many bits?

    • 30 or 104

    • 50 or 104

    • 40 or 104

    • 60 or 104

    Correct Answer
    A. 40 or 104
  • 26. 

    DoS attacks can occur at what layers of the OSI model?

    • 1 or 4

    • 1 or 3

    • 1 or 2

    • 2 or 3

    Correct Answer
    A. 1 or 2
  • 27. 

    Which layer of the OSI model has the most common DoS attacks?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 2
  • 28. 

    A policy mandating very strong pass phrases of how many characters or more to always be in place?

    • 10

    • 15

    • 20

    • 25

    Correct Answer
    A. 20
  • 29. 

    Most common and original war-driving software tool is a freeware program called?

    • NetFinder

    • NetLocator

    • NetSearch

    • NetStumbler

    Correct Answer
    A. NetStumbler
  • 30. 

    What is used with the 4-way handshake to create the final dynamic encryption keys?

    • PMK

    • PSK

    • WPA

    • WPA2

    Correct Answer
    A. PMK
  • 31. 

    Devices can be accessed via a web interface, command line, serial port, console connection, and or?

    • HTTPS

    • SMTP

    • SNMP

    • MFP

    Correct Answer
    A. SNMP
  • 32. 

    WLAN discovery tools may use what?

    • Active scanning

    • Retro scanning

    • Port scanning

    • Passive scanning

    Correct Answer
    A. Passive scanning
  • 33. 

    An attack that often generates a lot of press is?

    • Phishing

    • DoS

    • Wireless hijacking

    • Man in the middle

    Correct Answer
    A. Wireless hijacking
  • 34. 

    A commonly overlooked risk is the?

    • DoS

    • DDoS

    • Hijacking

    • Peer-to-Peer Attack

    Correct Answer
    A. Peer-to-Peer Attack
  • 35. 

    Which of the following is another term used to describe client isolation?

    • Peer-to-peer attack

    • Interuser bridging

    • Casual eavesdropping

    • DoS

    Correct Answer
    A. Interuser bridging
  • 36. 

    802.11w-2009 amendment defines what mechanisms for the prevention of spoofing?

    • SNMP

    • SMTP

    • MFP

    • HTTPS

    Correct Answer
    A. MFP
  • 37. 

    What does WEP stand for?

    • Wireless Equivalent Privacy

    • Wired Equivalent Privacy

    • Wireless Equivalent Protection

    • Wired Equivalent Protection

    Correct Answer
    A. Wired Equivalent Privacy
  • 38. 

    Attacker may also have web server and captive portal software for what type of attack?

    • DoS

    • WiFi Phishing

    • Hijacking

    • Man in the Middle

    Correct Answer
    A. WiFi Phishing
  • 39. 

    Attack on the wireless networks that receives the least attention is?

    • Phishing

    • Wireless hijacking

    • DDoS

    • DoS

    Correct Answer
    A. DoS
  • 40. 

    What is a weak authentication method that is vulnerable to a brute force attack?

    • TSK

    • WPA

    • WPA2

    • PSK

    Correct Answer
    A. PSK

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2013
    Quiz Created by
    KillaCadillack
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.