100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

M06 - Part 1_ Quiz_ Module 11 Wireless Network Security (1)

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
24-06-2024
Written in
2023/2024

M06 - Part 1_ Quiz_ Module 11 Wireless Network Security (1)

Institution
Module








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Module

Document information

Uploaded on
June 24, 2024
Number of pages
2
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

M06 - Part 1: Quiz: Module 11 Wireless
Network Security
Aaliyah has been asked to do research in a new payment system for the retail stores
that her company owns. Which technology is predominately used for contactless
payment systems that she will investigate? - ANS-Near field communication (NFC)

Nyla is investigating a security incident in which the smartphone of the CEO was
compromised and confidential data was stolen. She suspects that it was an attack that
used Bluetooth. Which attack would this be? - ANS-Bluesnarfing

What is a difference between NFC and RFID? - ANS-RFID is designed for paper-based
tags while NFC is not.

Which technical specification of the Wi-Fi Alliance is the same as ad hoc mode in a
Wi-Fi network? - ANS-Wi-Fi Direct

Fatima has just learned that employees have tried to install their own wireless router in
the employee lounge. Why is installing this rogue AP a security vulnerability? - ANS-It
allows an attacker to bypass network security configurations.

Which of these is NOT a risk when a home wireless router is not securely configured? -
ANS-Wireless endpoints must be manually approved to connect to the WLAN

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? - ANS-PIN
method

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When
he first connects, a screen appears that requires him to agree to an acceptable use
policy (AUP) before continuing. What type of AP has he encountered? - ANS-Captive
portal

Which of the following is NOT a means by which a threat actor can perform a wireless
denial of service attack? - ANS-EEE 802.iw separate

Zariah is writing an email to an employee about a wireless attack that is designed to
capture the wireless transmissions from legitimate users. Which type of attack is Zariah
describing? - ANS-Evil twin

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
scholartutor Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
2600
Member since
1 year
Number of followers
3
Documents
10515
Last sold
2 weeks ago

4.8

637 reviews

5
546
4
61
3
20
2
6
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions