1.
Bluetooth devices are not backward compatible with previous versions.
Correct Answer
B. False
Explanation
Bluetooth devices are actually backward compatible with previous versions. This means that newer Bluetooth devices can still connect and communicate with older Bluetooth devices. This compatibility allows for seamless integration and interoperability between different versions of Bluetooth technology. Therefore, the correct answer is False.
2.
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Correct Answer
A. True
Explanation
The weakness of WEP (Wired Equivalent Privacy) encryption protocol allows an attacker to identify two packets derived from the same Initialization Vector (IV). This is because WEP reuses IVs, which makes it easier for an attacker to analyze patterns and exploit the encryption. By identifying packets with the same IV, an attacker can potentially gather information about the encrypted data and compromise the security of the network. Therefore, the statement is true.
3.
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Correct Answer
B. False
Explanation
PEAP (Protected Extensible Authentication Protocol) is a widely used authentication method that provides secure communication between clients and servers. While it is true that PEAP can be vulnerable to certain attacks, such as man-in-the-middle attacks, it does not necessarily mean that users should migrate to a more secure EAP (Extensible Authentication Protocol). Instead, Cisco recommends implementing additional security measures, such as using server certificates and strong passwords, to mitigate the vulnerabilities associated with PEAP. Therefore, the statement that users should migrate to a more secure EAP than PEAP is false.
4.
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Correct Answer
B. False
Explanation
Antennas are generally positioned to provide the broadest area of coverage, but this does not mean that APs should be located at the end of the coverage area. In fact, APs are typically placed in the center of the coverage area to ensure more even distribution of the wireless signal. Placing APs at the end of the coverage area could result in weaker signal strength and coverage towards the center, leading to potential dead zones. Therefore, the statement is false.
5.
APs use antennas that radiate a signal in all directions.
Correct Answer
A. True
Explanation
APs, or Access Points, are devices that provide wireless network connectivity. They use antennas to transmit and receive signals. These antennas are designed to radiate the signal in all directions, creating a 360-degree coverage area. This allows multiple devices to connect to the network from various angles and distances. Therefore, the statement "APs use antennas that radiate a signal in all directions" is true.
6.
Bluetooth is a ____ technology designed for data communication over short distances.
Correct Answer
C. Personal Area Network
Explanation
Bluetooth is a technology that allows for data communication over short distances. It is specifically designed for personal use, such as connecting devices like smartphones, tablets, and laptops to peripherals like headphones, speakers, and keyboards. Therefore, the correct answer is "Personal Area Network."
7.
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
Correct Answer
D. 33
Explanation
Most Bluetooth devices use a Class 2 radio that has a range of 33 feet. This means that the Bluetooth signal can typically reach devices within a 33-foot radius. Class 2 radios are commonly found in smartphones, tablets, and other portable devices, allowing them to connect wirelessly to other Bluetooth-enabled devices within this range.
8.
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
Correct Answer
B. Bluetooth v1.2
Explanation
The correct answer is Bluetooth v1.2. The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the Bluetooth v1.2 specifications. This version of Bluetooth introduced several improvements over the previous versions, including enhanced data rates, improved security features, and better power management. It also added support for adaptive frequency hopping, which helps reduce interference and improve the overall performance of wireless communication.
9.
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
Correct Answer
A. Active
Explanation
Slave devices that are actively participating in the piconet by sending transmissions are known as active slaves. These devices are actively involved in the communication process and contribute to the data exchange within the piconet.
10.
A group of piconets in which connections exist between different piconets is called a ____.
Correct Answer
D. Scatternet
Explanation
A scatternet is a group of piconets where connections exist between different piconets. It allows devices from different piconets to communicate with each other, creating a network that spans multiple piconets. This enables increased flexibility and connectivity between devices in a wireless network.
11.
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
Correct Answer
B. Bluejacking
Explanation
Bluejacking is an attack that involves sending unsolicited messages to Bluetooth-enabled devices. This type of attack does not involve any malicious intent or harm to the device, but rather aims to annoy or surprise the recipient by sending them unwanted messages or advertisements. Bluejacking takes advantage of the Bluetooth feature that allows devices to discover and connect with each other, and it typically involves sending messages to nearby devices without the user's consent or knowledge.
12.
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
Correct Answer
C. Bluesnarfing
Explanation
Bluesnarfing is an attack that allows unauthorized access to information on a wireless device through a Bluetooth connection. This attack is commonly carried out between cell phones and laptop computers. Bluejacking, on the other hand, is a harmless practice of sending unsolicited messages to Bluetooth-enabled devices. Bluecracking and Bluetalking are not recognized terms in the context of Bluetooth security attacks.
13.
A(n) ____ acts as the “base station” for the wireless network.
Correct Answer
A. AP
Explanation
An Access Point (AP) acts as the "base station" for the wireless network. It is a device that allows wireless devices to connect to a wired network using Wi-Fi. The AP acts as a central hub, transmitting and receiving data between the wireless devices and the wired network. It provides a wireless signal for devices to connect to and manages the network traffic, allowing multiple devices to connect and communicate with each other.
14.
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Correct Answer
C. rogue
Explanation
A rogue access point refers to an unauthorized AP that an attacker can set up to exploit network security configurations. By doing so, the attacker can gain access to the network and its users, making them vulnerable to various attacks. This unauthorized AP bypasses the network's security measures, making it a significant threat to the network's overall security.
15.
An ____ is an AP that is set up by an attacker.
Correct Answer
D. Evil twin
Explanation
An evil twin is an AP that is set up by an attacker. This term is commonly used in the context of wireless networks. In this scenario, the attacker creates a fake access point that appears to be legitimate, tricking users into connecting to it. Once connected, the attacker can intercept and manipulate the user's network traffic, potentially gaining unauthorized access to sensitive information.
16.
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
Correct Answer
B. Association request
Explanation
When a device receives a beacon frame from an AP, it needs to establish a connection with the AP. To do so, the device sends an association request frame to the AP. This frame contains information about the device and its capabilities, allowing the AP to determine if it can accommodate the device's connection request. The association request frame is a crucial step in the process of joining a wireless network and establishing communication with the AP.
17.
The SSID can generally be any alphanumeric string from 2 to ___ characters.
Correct Answer
C. 32
Explanation
The SSID (Service Set Identifier) is a unique name that identifies a wireless network. It can generally be any alphanumeric string from 2 to 32 characters long. This allows for a wide range of possibilities when creating a network name, while still providing enough characters to make it unique and easily identifiable.
18.
is designed to detect any changes in a packet, whether accidental or intentional.
Correct Answer
B. CRC
Explanation
CRC (Cyclic Redundancy Check) is a technique used to detect errors in data transmission. It works by generating a checksum for the data and appending it to the packet. When the packet is received, the checksum is recalculated and compared to the original checksum. If they match, it indicates that the packet has not been altered during transmission. CRC can detect both accidental and intentional changes in a packet, making it a reliable method for ensuring data integrity.
19.
____ is the encryption protocol standard for WPA2.
Correct Answer
A. AES-CCMP
Explanation
AES-CCMP is the correct answer because it is the encryption protocol standard used in WPA2. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides strong security and is widely used in various applications. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is a mode of operation for AES that provides data confidentiality, integrity, and authentication. It is the recommended encryption protocol for WPA2, which is a security protocol used in Wi-Fi networks to protect data transmission.
20.
Is a framework for transporting authentication protocols instead of the authentication protocol itself.
Correct Answer
D. EAP
Explanation
EAP (Extensible Authentication Protocol) is a framework that provides a standardized way for transporting authentication protocols. It is not an authentication protocol itself, but rather a framework that allows different authentication methods to be used within it. This means that EAP can support various authentication protocols, such as PEAP, TKIP, and SSL, by providing a common structure for their communication.
21.
EAP request packets are issued by the ____.
Correct Answer
B. Authenticator
Explanation
EAP request packets are issued by the authenticator. The authenticator is responsible for mediating the authentication process between the supplicant (client) and the authentication server. It receives the EAP request packets from the supplicant and forwards them to the authentication server for further processing. Therefore, the authenticator plays a crucial role in facilitating the communication between the supplicant and the authentication server during the authentication process.
22.
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.
Correct Answer
C. EAP
Explanation
EAP (Extensible Authentication Protocol) packets contain a field that indicates the function of the packet and an identifier field used to match requests and responses. EAP is an authentication framework that allows for different methods of authentication to be used within a network. The identifier field helps to keep track of the authentication process by matching requests with their corresponding responses. ICMP (Internet Control Message Protocol), TKIP (Temporal Key Integrity Protocol), and RADIUS (Remote Authentication Dial-In User Service) packets do not typically contain these specific fields.
23.
____ requires mutual authentication used for WLAN encryption using Cisco client software.
Correct Answer
A. LEAP
Explanation
LEAP (Lightweight Extensible Authentication Protocol) requires mutual authentication used for WLAN encryption using Cisco client software. LEAP is a Cisco-proprietary authentication method that provides a secure way for users to connect to a wireless network. It uses a username and password for authentication and requires both the client and the server to authenticate each other. This ensures that the client is connecting to a legitimate access point and the access point is connecting to a legitimate client. LEAP is commonly used in Cisco wireless networks for secure authentication.
24.
is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.
Correct Answer
C. PEAP
Explanation
PEAP (Protected Extensible Authentication Protocol) is considered a more flexible EAP (Extensible Authentication Protocol) scheme because it creates an encrypted channel between the client and the authentication server. This means that the data being transmitted between the client and the server is secure and cannot be easily intercepted or tampered with by unauthorized individuals. This encryption helps to ensure the confidentiality and integrity of the data being exchanged, making PEAP a preferred choice for secure communication in authentication processes.
25.
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Correct Answer
B. Rogue
Explanation
Rogue access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data. Unlike legitimate access points, rogue access points are unauthorized and often set up by attackers to deceive users into connecting to them. Once connected, attackers can gain access to the network and launch various malicious activities, such as eavesdropping on communications, injecting malware, or stealing sensitive information. Therefore, identifying and removing rogue access points is crucial to maintaining network security.
26.
____ allow a single access point to service different types of users.
Correct Answer
D. Wireless VLANs
Explanation
Wireless VLANs allow a single access point to service different types of users. VLANs (Virtual Local Area Networks) divide a physical network into multiple logical networks, allowing different groups of users to be isolated from each other while sharing the same access point. This enables efficient management of network resources and improves security by segregating traffic between different user groups. Wireless VLANs are commonly used in environments such as offices, universities, and hotels where multiple user groups with different network requirements coexist.