CWNA Chapter 14

25 Questions

Settings
CWNA Quizzes & Trivia

Questions and Answers
  • 1. 
    What is a potential open and unsecured gateway straight into the wired infrastructure?
    • A. 

      Access Point

    • B. 

      Rouge Access Point

    • C. 

      Port

    • D. 

      Firewall

  • 2. 
    Any unauthorized WiFi device that is not under proper management is a?
    • A. 

      Rouge Access Point

    • B. 

      Access Point

    • C. 

      Port

    • D. 

      Firewall

  • 3. 
    What wireless connection also has the potential of providing a rouge access point?
    • A. 

      Ethernet

    • B. 

      Infrastructure

    • C. 

      Ad-Hoc

    • D. 

      Fire Wire

  • 4. 
    A commonly overlooked risk is the?
    • A. 

      DoS

    • B. 

      DDoS

    • C. 

      Hijacking

    • D. 

      Peer-to-Peer Attack

  • 5. 
    What is a feature that blocks wireless clients from communicating with each other?
    • A. 

      Client Isolation

    • B. 

      Peer-to-Peer Attack

    • C. 

      Eavesdropping

    • D. 

      DoS

  • 6. 
    Which of the following is another term used to describe client isolation?
    • A. 

      Peer-to-peer attack

    • B. 

      Interuser bridging

    • C. 

      Casual eavesdropping

    • D. 

      DoS

  • 7. 
    What are the two eavesdropping methods?
    • A. 

      Casual and ordinary

    • B. 

      Malicious and ordinary

    • C. 

      Casual and malicious

    • D. 

      Malicious and non casual

  • 8. 
    Casual eavesdropping is sometimes called?
    • A. 

      VLAN discovery

    • B. 

      WLAN discovery

    • C. 

      WAN discovery

    • D. 

      WWAN discovery

  • 9. 
    WLAN discovery tools may use what?
    • A. 

      Active scanning

    • B. 

      Retro scanning

    • C. 

      Port scanning

    • D. 

      Passive scanning

  • 10. 
    WLAN discovery is considered harmless and is referred to as?
    • A. 

      Free-driving

    • B. 

      War-driving

    • C. 

      WLAN-driving

    • D. 

      Wireless-driving

  • 11. 
    What is strictly looking for a wireless network while in a moving vehicle?
    • A. 

      War-driving

    • B. 

      Free-driving

    • C. 

      Wireless-driving

    • D. 

      WLAN-driving

  • 12. 
    What is an old technique used by hackers to use modems to scan phone numbers for computer networks?
    • A. 

      War-driving

    • B. 

      War-Scanning

    • C. 

      War-Dialing

    • D. 

      War-Searching

  • 13. 
    Most common and original war-driving software tool is a freeware program called?
    • A. 

      NetFinder

    • B. 

      NetLocator

    • C. 

      NetSearch

    • D. 

      NetStumbler

  • 14. 
    Unauthorized use of 802.11 protocol analyzers to capture wireless connections is called?
    • A. 

      Malicious eavesdropping

    • B. 

      Casual eavesdropping

    • C. 

      Non casual eavesdropping

    • D. 

      Illegal eavesdropping

  • 15. 
    What does WEP stand for?
    • A. 

      Wireless Equivalent Privacy

    • B. 

      Wired Equivalent Privacy

    • C. 

      Wireless Equivalent Protection

    • D. 

      Wired Equivalent Protection

  • 16. 
    WEP keys are how many bits?
    • A. 

      30 or 104

    • B. 

      50 or 104

    • C. 

      40 or 104

    • D. 

      60 or 104

  • 17. 
    What was once one of the most commonly deployed 802.1x/EAP solutions?
    • A. 

      HEAP

    • B. 

      LEAP

    • C. 

      MEAP

    • D. 

      NEAP

  • 18. 
    What is a weak authentication method that is vulnerable to a brute force attack?
    • A. 

      TSK

    • B. 

      WPA

    • C. 

      WPA2

    • D. 

      PSK

  • 19. 
    What is used with the 4-way handshake to create the final dynamic encryption keys?
    • A. 

      PMK

    • B. 

      PSK

    • C. 

      WPA

    • D. 

      WPA2

  • 20. 
    A policy mandating very strong pass phrases of how many characters or more to always be in place?
    • A. 

      10

    • B. 

      15

    • C. 

      20

    • D. 

      25

  • 21. 
    All 802.11 wireless network cards have a physical address known as a?
    • A. 

      WAC address

    • B. 

      NAC address

    • C. 

      BAC address

    • D. 

      MAC address

  • 22. 
    A MAC address is a hexadecimal number of how many digits?
    • A. 

      10

    • B. 

      12

    • C. 

      15

    • D. 

      18

  • 23. 
    What is often used as a security mechanism for legacy client devices?
    • A. 

      MAC filtering

    • B. 

      Port filtering

    • C. 

      Firewall filtering

    • D. 

      AP filtering

  • 24. 
    Devices can be accessed via a web interface, command line, serial port, console connection, and or?
    • A. 

      HTTPS

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      MFP

  • 25. 
    Strong passwords should be used and encrypted login capabilities such as what should be used?
    • A. 

      HTTPS

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      MFP