WSEC Module 1 Quiz/Exam questions and answers
1. A WLAN can create interference on other wireless devices but cannot itself be interfered with because of its high microwatt power distribution. True or False?
2. Many organizations have resisted implementing wireless on a broad scale because of the lack of security in wireless. True or False?
3. A zero day attack occurs when an attacker discovers and exploits a previously unknown flaw in software. True or False?
4. It is not possible for an attacker to use multiple computers in order to launch an attack. True or False?
5. Individuals who actively search for wireless signals to pick up, often by just driving down the street, are participating in an activity known as _____. war driving
6. An employee who purchases a wireless access point and brings it into the office in order to provide personal wireless access has installed what is known as a(n) _____. rogue access point.
7. A(n)_____ is software or hardware that can view the contents of wireless packets. wireless packet sniffer
8. _____ is a general term used to describe worms, viruses, spyware, or other types of software that has a malicious intent. Malware
9. Almost all _____ have clauses in their contracts that prohibit users from sharing a wireless Internet connection with members outside of the household. Internet Service Provider (ISP)
10. Wireless location mapping refers to passive wireless discovery, also known as
b. wireless address allocation (WAA)
c. spear driving
d. access point collecting
11.† Each of the following is a technique used by wardrivers except
a. Drive at slower speeds
b. Use freeways or Interstate highways
c. Repeat over time
d. Divide the area into sectors
12.† Each of the following is a necessary piece of hardware for wardriving except
b. computing device
d. wireless NIC adapter
13.† For laptop, tablet and handheld PCs an external wireless NICs can plug into the _____ port, as either as a standalone device or a key fob. USB
14.† †A(n) _____is a small card that is functionally equivalent to a standard PCI expansion card and is used for wireless NIC adapters in laptop computers. mini PCI
15.† Not all chipsets support _____, which is a passive method of receiving WLAN signals. radio frequency monitoring (RFMON)
16.† GPS receivers can deduce their own location based on the mathematical principle of _____. trilateration
17.† Describe the two fundamental characteristics of antennas.
First, as the frequency gets higher the wavelength becomes smaller. This means that the size of the antenna likewise is smaller. Consider a cellular telephone: it uses a high frequency so only a small antenna is required. Secondly, as the gain (positive difference in amplitude between two signals) of an antenna increases, the coverage area narrows. High-gain antennas offer longer coverage areas than low-gain antennas at the same input power level.
18. †What are the three types of antennas? What type(s) are commonly used to detect wireless networks?
There are three basic categories of antennas: omni-directional, semi-directional and highly-directional. The most common type of antenna for a WLAN, whether wardriving or in standard use, is an omni-directional antenna, also known as a dipole antenna. An omni-directional antenna detects from all directions equally. Unlike an omni-directional antenna that evenly spreads the signal in all directions, a semi-directional antenna focuses the energy in one direction. Semi-directional antennas are primarily used for short and medium range remote wireless bridge networks. Highly-directional antennas send a narrowly focused signal beam. Highly-directional antennas are generally concave dish-shaped devices. These antennas are used for long distance, point-to-point wireless links, such as connecting buildings that are up to 42 kilometers (25 miles) apart.
19. †What is a wireless client utility and why were they used?
When WLANs first appeared operating systems were unaware of their presence. Wireless NIC adapter manufacturers included client software utilities that were used to detect a wireless signal and then connect to that network. These client utilities also provided the ability to adjust client parameters, report statistics, and show signal strength. However, the popularity of client utilities has decreased. Few wireless NIC adapter manufacturers now include client software utilities to accompany their hardware. In addition, some of those that do make the utilities available configure the software not to function unless that vendorís specific wireless NIC is installed and functioning in the computer.
20. How are wireless networks vulnerable to wireless packet sniffers, and how do you protect against this vulnerability?
Wireless packet sniffers can be used by attackers to capture unencrypted packets and view their contents. Wireless packet sniffers can reveal usernames and passwords, SNMP community strings, encryption keys, and MAC addresses. The best preventative measures for protecting against this data being viewed is to encrypt the packets before they are transmitted.