Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
IT Certification
CWNA Chapter 14
40 Questions
|
By KillaCadillack | Updated: Mar 19, 2022
| Attempts: 123
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 40
0 %
0/100
Score
0/100
1.
DoS stands for what?
Distribution of Service
Denial of Service
Destruction of Service
Deletion of Service
Submit
Start Quiz
About This Quiz
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
Any unauthorized WiFi device that is not under proper management is a?
Rouge Access Point
Access Point
Port
Firewall
Submit
3.
The best tool to detect any layer 1 interference is a?
Spectrum Detector
Spectrum Analyzer
Spectrum Finder
Spectrum Locator
Submit
4.
All 802.11 wireless network cards have a physical address known as a?
WAC address
NAC address
BAC address
MAC address
Submit
5.
What can be used to force any clients to roam to an Evil Twin AP?
AF Jammer
RF Jammer
GF Jammer
MF Jammer
Submit
6.
Unauthorized use of 802.11 protocol analyzers to capture wireless connections is called?
Malicious eavesdropping
Casual eavesdropping
Non casual eavesdropping
Illegal eavesdropping
Submit
7.
Wireless hijacking is also known as?
Evil brother attack
Evil father attack
Evil twin attack
Evil sister attack
Submit
8.
What is often used as a security mechanism for legacy client devices?
MAC filtering
Port filtering
Firewall filtering
AP filtering
Submit
9.
Strong passwords should be used and encrypted login capabilities such as what should be used?
HTTPS
SMTP
SNMP
MFP
Submit
10.
Layer 1 DoS attacks are known as?
RF jamming attacks
MF jamming attacks
AF jamming attacks
GF jamming attacks
Submit
11.
What wireless connection also has the potential of providing a rouge access point?
Ethernet
Infrastructure
Ad-Hoc
Fire Wire
Submit
12.
What type of jamming occurs when microwaves and cordless phones cause DoS?
Unintentional
Accidental
Intentional
Harmful
Submit
13.
What is a feature that blocks wireless clients from communicating with each other?
Client Isolation
Peer-to-Peer Attack
Eavesdropping
DoS
Submit
14.
Casual eavesdropping is sometimes called?
VLAN discovery
WLAN discovery
WAN discovery
WWAN discovery
Submit
15.
What is strictly looking for a wireless network while in a moving vehicle?
War-driving
Free-driving
Wireless-driving
WLAN-driving
Submit
16.
Attacker may use a 2nd wireless card with their laptop to execute a?
Man in the middle
DoS
Phishing
Hijacking
Submit
17.
What was once one of the most commonly deployed 802.1x/EAP solutions?
HEAP
LEAP
MEAP
NEAP
Submit
18.
WLAN discovery is considered harmless and is referred to as?
Free-driving
War-driving
WLAN-driving
Wireless-driving
Submit
19.
What is an old technique used by hackers to use modems to scan phone numbers for computer networks?
War-driving
War-Scanning
War-Dialing
War-Searching
Submit
20.
What type of jamming occurs when an attacker uses a signal generator to cause interference in the unlicensed frequency space?
Unintentional
Accidental
Intentional
Harmful
Submit
21.
What is a technique used to manipulate people into divulging confidential information such as passwords?
Wireless hijacking
Phishing
DoS
Social Engineering
Submit
22.
What are the two eavesdropping methods?
Casual and ordinary
Malicious and ordinary
Casual and malicious
Malicious and non casual
Submit
23.
A MAC address is a hexadecimal number of how many digits?
10
12
15
18
Submit
24.
What is a potential open and unsecured gateway straight into the wired infrastructure?
Access Point
Rouge Access Point
Port
Firewall
Submit
25.
WEP keys are how many bits?
30 or 104
50 or 104
40 or 104
60 or 104
Submit
26.
DoS attacks can occur at what layers of the OSI model?
1 or 4
1 or 3
1 or 2
2 or 3
Submit
27.
Which layer of the OSI model has the most common DoS attacks?
1
2
3
4
Submit
28.
A policy mandating very strong pass phrases of how many characters or more to always be in place?
10
15
20
25
Submit
29.
Most common and original war-driving software tool is a freeware program called?
NetFinder
NetLocator
NetSearch
NetStumbler
Submit
30.
What is used with the 4-way handshake to create the final dynamic encryption keys?
PMK
PSK
WPA
WPA2
Submit
31.
Devices can be accessed via a web interface, command line, serial port, console connection, and or?
HTTPS
SMTP
SNMP
MFP
Submit
32.
WLAN discovery tools may use what?
Active scanning
Retro scanning
Port scanning
Passive scanning
Submit
33.
An attack that often generates a lot of press is?
Phishing
DoS
Wireless hijacking
Man in the middle
Submit
34.
A commonly overlooked risk is the?
DoS
DDoS
Hijacking
Peer-to-Peer Attack
Submit
35.
Which of the following is another term used to describe client isolation?
Peer-to-peer attack
Interuser bridging
Casual eavesdropping
DoS
Submit
36.
802.11w-2009 amendment defines what mechanisms for the prevention of spoofing?
SNMP
SMTP
MFP
HTTPS
Submit
37.
What does WEP stand for?
Wireless Equivalent Privacy
Wired Equivalent Privacy
Wireless Equivalent Protection
Wired Equivalent Protection
Submit
38.
Attacker may also have web server and captive portal software for what type of attack?
DoS
WiFi Phishing
Hijacking
Man in the Middle
Submit
39.
Attack on the wireless networks that receives the least attention is?
Phishing
Wireless hijacking
DDoS
DoS
Submit
40.
What is a weak authentication method that is vulnerable to a brute force attack?
TSK
WPA
WPA2
PSK
Submit
View My Results
Related Quizzes
F60 Fire Guard Practice Test Quiz
F60 Fire Guard Practice Test Quiz
CPSGT And RPSGT Quiz: Exam!
CPSGT And RPSGT Quiz: Exam!
Mastering Clinical Research: SOCRA Exam Mastery Quiz
Mastering Clinical Research: SOCRA Exam Mastery Quiz
Certified Tarot Reader: Final Exam
Certified Tarot Reader: Final Exam
Prelim Exam: Cooperative Management! Quiz
Prelim Exam: Cooperative Management! Quiz
EHR Exam Quiz
EHR Exam Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (40)
Unanswered (
)
Answered (
)
DoS stands for what?
Any unauthorized WiFi device that is not under proper management is a?
The best tool to detect any layer 1 interference is a?
All 802.11 wireless network cards have a physical address known as a?
What can be used to force any clients to roam to an Evil Twin AP?
Unauthorized use of 802.11 protocol analyzers to capture wireless...
Wireless hijacking is also known as?
What is often used as a security mechanism for legacy client devices?
Strong passwords should be used and encrypted login capabilities such...
Layer 1 DoS attacks are known as?
What wireless connection also has the potential of providing a rouge...
What type of jamming occurs when microwaves and cordless phones cause...
What is a feature that blocks wireless clients from communicating with...
Casual eavesdropping is sometimes called?
What is strictly looking for a wireless network while in a moving...
Attacker may use a 2nd wireless card with their laptop to execute a?
What was once one of the most commonly deployed 802.1x/EAP solutions?
WLAN discovery is considered harmless and is referred to as?
What is an old technique used by hackers to use modems to scan phone...
What type of jamming occurs when an attacker uses a signal generator...
What is a technique used to manipulate people into divulging...
What are the two eavesdropping methods?
A MAC address is a hexadecimal number of how many digits?
What is a potential open and unsecured gateway straight into the wired...
WEP keys are how many bits?
DoS attacks can occur at what layers of the OSI model?
Which layer of the OSI model has the most common DoS attacks?
A policy mandating very strong pass phrases of how many characters or...
Most common and original war-driving software tool is a freeware...
What is used with the 4-way handshake to create the final dynamic...
Devices can be accessed via a web interface, command line, serial...
WLAN discovery tools may use what?
An attack that often generates a lot of press is?
A commonly overlooked risk is the?
Which of the following is another term used to describe client...
802.11w-2009 amendment defines what mechanisms for the prevention of...
What does WEP stand for?
Attacker may also have web server and captive portal software for what...
Attack on the wireless networks that receives the least attention is?
What is a weak authentication method that is vulnerable to a brute...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement