logo image

OS Hardening – SEC340 Chapter 6, 7

In which frequency range are you likely to find WLANs?
Select one:
a. 2.9-30 GHz
b. 3-30 MHz
c. 30-300 GHz
d. 174-328 MHz
a. 2.9-30 GHz
In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge?
Select one:
a. man-in-the-middle
b. rogue device
c. brute force
d. wardriver
a. man-in-the-middle
In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?
Select one:
a. jamming
b. association flood
c. MAC address spoofing
d. session hijacking
d. session hijacking
What does a measurement of +3 dB equal in power measured in mW?
Select one:
a. one half the power
b. 3 times the power
c. one third the power
d. double the power
d. double the power
What function does a RADIUS server provide to a wireless network?
Select one:
a. association
b. encryption
c. decryption
d. authentication
d. authentication
What is a Basic Service Set?
Select one:
a. wireless devices set up as a basic ad-hoc network
b. a wireless network that does not use an AP
c. a group of wireless devices served by a single AP
d. multiple APs are set up to provide some overlap
c. a group of wireless devices served by a single AP
What is a potential problem with having too many APs in a given area?
Select one:
a. refraction
b. fading
c. multipath
d. co-channel interference
d. co-channel interference
What is a WNIC’s equivalent of a NIC’s promiscuous mode?
Select one:
a. passive attack mode
b. RF monitor mode
c. active scan mode
d. auto-capture mode
b. RF monitor mode
What is considered to be one of the biggest weaknesses of WEP?
Select one:
a. 128-bit key
b. RC4 encryption
c. Kerberos authentication
d. 24-bit initialization vector
d. 24-bit initialization vector
What is used to convert an analog RF signal into digital format?
Select one:
a. EIRP
b. carrier
c. modulator Correct
d. spectrum
c. modulator
What term is given to a device that is designed to generate radio signals, not including those from the antenna?
Select one:
a. intentional radiator
b. oscillator
c. EIRP
d. conductive medium
a. intentional radiator
Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not drop back to zero before the end of the bit period?
Select one:
a. RTZ
b. NRZ
c. polar NRZ
d. polar RTZ
b. NRZ
Which digital signal modulation method is a binary modulation technique in which the carrier signal’s frequency is changed to represent a 1 or 0 bit?
Select one:
a. ASK
b. PSK
c. FDM
d. FSK
d. FSK
Which EAP protocol requires digital certificates to validate supplicants?
Select one:
a. EAP-TLS
b. EAP-TTLS
c. FAST
d. LEAP
a. EAP-TLS
Which layer does wireless communication rely heavily upon?
Select one:
a. MAC sublayer of the Network layer
b. LLC sublayer of the Transport layer
c. LLC sublayer of the Data Link layer
d. MAC sublayer of the Data Link layer
d. MAC sublayer of the Data Link layer
Which management frame type is sent by a station wanting to terminate the connection?
Select one:
a. Reassociation request
b. Disassociation
c. Probe response
d. Deauthentication
b. Disassociation
Which of the following causes of signal loss is defined as differences in density between air masses over distance?
Select one:
a. absorption
b. reflection
c. refraction
d. scattering
c. refraction
Which of the following is defined as the maximum departure of a wave from the undisturbed state?
Select one:
a. amplitude
b. spectrum
c. wavelength
d. frequency
a. amplitude
Which of the following is defined as the positive difference in amplitude between two signals?
Select one:
a. fading
b. attenuation
c. reflection
d. gain
d. gain
Which of the following is NOT a field in a control frame?
Select one:
a. Frame control
b. Sequence control
c. Frame check sequence
d. Duration
b. Sequence control
Which of the following is NOT a suggested practice before using a newly configured wireless network?
Select one:
a. alter the default channel
b. change the administrator password
c. change the manufacturer’s default key
d. use the default encryption method
d. use the default encryption method
Which of the following is NOT part of a wireless MAC frame?
Select one:
a. 802.11 protocol version
b. FCS
c. source MAC address
d. TTL
d. TTL
Which of the following is performed by the MAC sublayer?
Select one:
a. joining the wireless network
b. resolving IP address to MAC address
c. determining best path
d. resolving names to IP addresses
a. joining the wireless network
Which of the following is true about IEEE 802.11i?
Select one:
a. temporal key integrity protocol is used for encryption
b. it uses WEP2 for authentication and encryption
c. it uses PMK to generate data encryption keys
d. it uses a symmetric block cipher for encryption
d. it uses a symmetric block cipher for encryption
Which of the following is true about infrared transmissions?
Select one:
a. diffused IR transmission requires emitter and detector to be aligned
b. IR transmissions have speeds up to 25 Mbps.
c. the intensity of the light pulse indicates the on or off status of each bit
d. directed IR transmission relies on reflected light
c. the intensity of the light pulse indicates the on or off status of each bit
Which of the following is true about MAC addresses in a wireless network?
Select one:
a. MAC addresses are Network layer identities
b. MAC address filtering will stop a determined attacker
c. you can change a WNICs MAC address with software
d. you need to configure the MAC address before you use the WNIC
c. you can change a WNICs MAC address with software
Which of the following is true about RF transmissions?
Select one:
a. cooler objects produce higher-frequency radiation than hotter objects Incorrect
b. frequency is the distance between waves
c. frequency has an inverse relationship with wavelength
d. EM radiation is measured in volts
c. frequency has an inverse relationship with wavelength
Which of the following is true about the association process?
Select one:
a. a station first send an association request
b. the AP transmits an invitation to associate
c. it is a three-step process
d. a station first listens for beacons
d. a station first listens for beacons
Which of the following is true about the SSID?
Select one:
a. they are found in control frames
b. they are not found in beacon frames
c. they are registered
d. they can be Null
d. they can be Null
Which of the following is true about wardriving?
Select one:
a. attackers use RF monitor mode
b. the hardware is very expensive
c. the software is very expensive
d. their goal is simply to hijack a connection
a. attackers use RF monitor mode
Which of the following pairs represents a medium frequency band and its common use?
Select one:
a. 3-30 MHz, CB and shortwave radio
b. 300 KHz-3MHz, AM radio
c. 144-174 MHz, TV channels
d. 30-300 KHz, cordless phones
b. 300 KHz-3MHz, AM radio
Which of the following tasks does an AP typically perform?
Select one:
a. bridges between the wired and wireless network
b. routes packets from subnet to subnet
c. acts as a hub for a wired network
d. divides data into packets
a. bridges between the wired and wireless network
Which popular wireless sniffer is an IDS that is passive and undetectable in operation?
Select one:
a. AirSnort
b. NetStumbler
c. Kismet
d. Aircrack-ng
c. Kismet
Which RF transmission method uses an expanded redundant chipping code to transmit each bit?
Select one:
a. CDMA
b. FHSS
c. DSSS
d. OFDM
c. DSSS
Which term is the measurement of the difference between two signals?
Select one:
a. watt
b. volt
c. decibel
d. amp
c. decibel
Which type of analog modulation changes the number of waves representing one cycle?
Select one:
a. amplitude modulation
b. frequency modulation
c. relative modulation
d. phase modulation
b. frequency modulation
Which type of control frame does a station send to let the AP know is can transmit buffered frames?
Select one:
a. ACK
b. CTS
c. PS-Poll
d. RTS
c. PS-Poll
Which type of frame advertises services or information on a wireless network?
Select one:
a. Probe request
b. Probe response
c. Association response
d. Beacon
d. Beacon
Which wireless networking standard uses the 2.4 GHz band and has a maximum bandwidth of 54 MBps?
Select one:
a. 802.11ac
b. 802.11g
c. 802.11b
d. 802.11a
b. 802.11g
Which wireless transmission method uses a hopping code?
Select one:
a. FHSS
b. infrared
c. OFDM
d. narrowband
a. FHSS

Need essay sample on "OS Hardening – SEC340 Chapter 6, 7"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy