Comp TIA Security+ Guide to Network Fundamentals - EOC Ch. 11 PDF

Title Comp TIA Security+ Guide to Network Fundamentals - EOC Ch. 11
Author Rachel Brener
Course Network Security Fundamentals
Institution Florida Gulf Coast University
Pages 2
File Size 84.5 KB
File Type PDF
Total Downloads 90
Total Views 138

Summary

Comp TIA Security+ Guide to Network Fundamentals - EOC Ch. 11...


Description

CHAPTER 11 Aaliyah has been asked to do research in a new payment system for the retail stores that her company owns. Which technology is predominately used for contactless payment systems that she will investigate? Nyla is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be? What is a difference between NFC and RFID? a. NFC is based on wireless technology while RFID is not. . RFID is faster than NFC. c. RFID is designed for paper-based tags while NFC is not. d. NFC devices cannot pair as quickly as RFID devices. Which technical specification of the Wi-Fi Alliance is the same as ad hoc mode in a Wi-Fi network? Fatima has just learned that employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability? Which of these is NOT a risk when a home wireless router is not securely configured? Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered? Which of the following is NOT a means by which a threat actor can perform a wireless denial of service attack? Zariah is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. Which type of attack is Zariah describing? Which of these is a vulnerability of MAC address filtering in a WLAN? Which of these is a 24-bit value that changes each time a packet is encrypted and then is combined with a shared secret key? Which of these does not require authentication? Which of these is the encryption protocol for WPA2? Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? Imani has been asked to purchase wireless LAN controllers (WLCs) for the office. What type of APs must she also purchase that can be managed by a WLC? Which WPA3 security feature is designed to increase security at the time of the handshake? Maryam is explaining the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?

Near field communication (NFC)

Bluesnarfing

RFID is designed for paper-based tags while NFC is not.

Wi-Fi Direct It allows an attacker to bypass network security configurations. Wireless endpoints must be manually approved to connect to the WLAN. PIN method Captive portal

IEEE 802.iw separate Evil twin

MAC addresses are initially exchanged unencrypted. IV Open method CCMP RFID spectrum

Controller AP

SAE It is a framework for transporting authentication protocols.

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? Which of these is NOT a type of wireless AP probe?

EAP-FAST WNIC probe...


Similar Free PDFs