Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Which of the following wireless encryption schemes offers the highest level of protection? |
WPA2 |
|
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities? |
WEP |
|
Which of the following answers refers to an authentication framework frequently used in wireless networks and point-to-point connections? |
EAP |
|
A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is known as: |
MAC Filter |
|
Which of the following acronyms refers to a wireless network name? |
SSID |
|
Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the replacement of legacy hardware? |
TKIP |
|
Disabling SSID broadcast does what: |
Makes a WLAN harder to discover |
|
Which of the following protocols encapsulates EAP within an encrypted and authenticated TLS tunnel? |
PEAP |
|
AES-based encryption mode implemented in WPA2 is known as: |
CCMP |
|
An optimal WAP antenna placement provides a countermeasure against: (Select 2 answers) |
War driving / Site survey |
|
Which of the following WAP configuration settings allows for adjusting the boundary range of the wireless signal? |
Power level controls |
|
Which of the following answers refers to a solution allowing administrators to block Internet access for users until they perform required action? |
Captive portal |
|
Which of the following antenna types would provide the best coverage for workstations connecting to a WAP placed in a central point of a typical office?(Select two answers) |
Non-directional / Omnidirectional |
|
Which of the following is an example of a wireless site survey? |
War driving |
|
Which of the following examples falls into the category of technical security controls? |
Intrusion detection system |
|
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of: |
False positive error |
|
Which of the following examples falls into the category of operational security controls? |
Change management (Letting people know of changes) |
|
Which of the following terms refers to a situation where no alarm is raised when an attack has taken place? |
False negative |
|
A policy outlining ways of collecting and managing personal data is known as: |
Privacy policy |
|
Which of the following acronyms refers to a set of rules enforced in a network that restrict the use to which the network may be put? |
AUP |
|
One of the goals behind the mandatory vacations policy is to mitigate the occurrence of fraudulent activity within the company. (True / False) |
True |
|
Which of the following answers refers to a concept of having more than one person required to complete a given task? |
Separation of duties |
|
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as: |
Principle of least privilege |
|
Which of the following acronyms refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period? |
ALE |