Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Which of the following is the BEST wireless security practice that could be implemented to prevent unauthorized access?
a. WPA2 with a strong pass-phrase b. Disabling of the SSID broadcast c. WPA2 with TKIP d. WPA with MAC filtering |
a. WPA2 with a strong pass-phrase
|
|
Which of the following BEST allows a technician to mitigate the chances of a successful attack against the wireless network?
a. Implement an identification system and WPA2. b. Implement a biometric system and WEP. c. Implement an authentication system and WPA. d. Implement an authentication system and WEP. |
c. Implement an authentication system and WPA.
|
|
Which of the following provides best practice with a wireless network?
a. WPA b. WPA with RADIUS c. 3DES with RADIUS d. WEP 128-bit |
b. WPA with RADIUS
|
|
Which of the following will allow wireless access to network resources based on certain ports?
a. 802.11n b. 802.11g c. 802.1x d. 802.11a |
c. 802.1x
|
|
Weak encryption is a common problem with which of the following wireless protocols?
a. WPA2-Enterprise b. WEP c. WPA2-Personal d. WPA |
b. WEP
|
|
All of the following are weaknesses of WEP EXCEPT:
a. lack of integrity checking. b. initialization vector. c. replay attacks. d. lack of strong keys. |
a. lack of integrity checking.
|
|
Which of the following would require a pre-sharing of information before a home user could attach to a neighbors wireless adapter?
a. Anonymous connections enabled b. SSID broadcasting disabled c. SSID broadcasting enabled d. Encryption disabled |
b. SSID broadcasting disabled
|
|
A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:
a. rogue access points. b. 802.11 mode. c. weak encryption. d. SSID broadcasts. |
b. 802.11 mode.
|
|
Which of the following improves security in a wireless system?
a. IP spoofing b. MAC filtering c. SSID spoofing d. Closed network |
b. MAC filtering
|
|
Which of the following would a Faraday cage prevent usage of?
a. Cell phone b. USB key c. Uninterruptible Power Supply (UPS) d. Storage drive |
a. Cell phone
|