Question 1
Question
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Answer
-
a. rogue
-
b. sanctioned
-
c. legitimate
-
d. random
Question 2
Question
An ____ is an AP that is set up by an attacker.
Answer
-
a. active twin
-
b. internal replica
-
c. evil twin
-
d. authorized twin
Question 3
Question
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
Question 4
Question
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Answer
-
a. Sanctioned
-
b. Rogue
-
c. Legitimate
-
d. Twin
Question 5
Question
____ is the encryption protocol standard for WPA2.
Answer
-
a. AES-CCMP
-
b. AES-TKIP
-
c. AES-CTR
-
d. AES-SCMP
Question 6
Question
____ requires mutual authentication used for WLAN encryption using Cisco client software.
Answer
-
a. PEAP
-
b. TKIP
-
c. EAP
-
d. LEAP
Question 7
Question
APs use antennas that radiate a signal in all directions.
Question 8
Question
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Question 9
Question
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Question 10
Question
Bluetooth devices are not backward compatible with previous versions.