• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Which of the following wireless encryption schemes offers the highest level of protection?

WPA2

Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities?

WEP

Which of the following answers refers to an authentication framework frequently used in wireless networks and point-to-point connections?

EAP

A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is known as:

MAC Filter

Which of the following acronyms refers to a wireless network name?

SSID

Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the replacement of legacy hardware?

TKIP

Disabling SSID broadcast does what:

Makes a WLAN harder to discover

Which of the following protocols encapsulates EAP within an encrypted and authenticated TLS tunnel?

PEAP

AES-based encryption mode implemented in WPA2 is known as:

CCMP

An optimal WAP antenna placement provides a countermeasure against: (Select 2 answers)

War driving / Site survey

Which of the following WAP configuration settings allows for adjusting the boundary range of the wireless signal?

Power level controls

Which of the following answers refers to a solution allowing administrators to block Internet access for users until they perform required action?

Captive portal

Which of the following antenna types would provide the best coverage for workstations connecting to a WAP placed in a central point of a typical office?(Select two answers)

Non-directional / Omnidirectional

Which of the following is an example of a wireless site survey?

War driving

Which of the following examples falls into the category of technical security controls?

Intrusion detection system

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:

False positive error

Which of the following examples falls into the category of operational security controls?

Change management


(Letting people know of changes)

Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?

False negative

A policy outlining ways of collecting and managing personal data is known as:

Privacy policy

Which of the following acronyms refers to a set of rules enforced in a network that restrict the use to which the network may be put?

AUP

One of the goals behind the mandatory vacations policy is to mitigate the occurrence of fraudulent activity within the company.


(True / False)

True

Which of the following answers refers to a concept of having more than one person required to complete a given task?

Separation of duties

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as:

Principle of least privilege

Which of the following acronyms refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?

ALE