• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Which of the following is the BEST wireless security practice that could be implemented to prevent unauthorized access?
a. WPA2 with a strong pass-phrase
b. Disabling of the SSID broadcast
c. WPA2 with TKIP
d. WPA with MAC filtering
a. WPA2 with a strong pass-phrase
Which of the following BEST allows a technician to mitigate the chances of a successful attack against the wireless network?
a. Implement an identification system and WPA2.
b. Implement a biometric system and WEP.
c. Implement an authentication system and WPA.
d. Implement an authentication system and WEP.
c. Implement an authentication system and WPA.
Which of the following provides best practice with a wireless network?
a. WPA
b. WPA with RADIUS
c. 3DES with RADIUS
d. WEP 128-bit
b. WPA with RADIUS
Which of the following will allow wireless access to network resources based on certain ports?
a. 802.11n
b. 802.11g
c. 802.1x
d. 802.11a
c. 802.1x
Weak encryption is a common problem with which of the following wireless protocols?
a. WPA2-Enterprise
b. WEP
c. WPA2-Personal
d. WPA
b. WEP
All of the following are weaknesses of WEP EXCEPT:
a. lack of integrity checking.
b. initialization vector.
c. replay attacks.
d. lack of strong keys.
a. lack of integrity checking.
Which of the following would require a pre-sharing of information before a home user could attach to a neighbors wireless adapter?
a. Anonymous connections enabled
b. SSID broadcasting disabled
c. SSID broadcasting enabled
d. Encryption disabled
b. SSID broadcasting disabled
A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:
a. rogue access points.
b. 802.11 mode.
c. weak encryption.
d. SSID broadcasts.
b. 802.11 mode.
Which of the following improves security in a wireless system?
a. IP spoofing
b. MAC filtering
c. SSID spoofing
d. Closed network
b. MAC filtering
Which of the following would a Faraday cage prevent usage of?
a. Cell phone
b. USB key
c. Uninterruptible Power Supply (UPS)
d. Storage drive
a. Cell phone