CDS 444 Final Exam – Questions & Accurate Solutions
(100% Correct By Experts)
An evil twin is which of the following? Right Ans - Rogue Access Point
Madison is the assistant manager of her company's finance department. She
receives an email from the IT department director requesting the password
and service set identifier (SSID) of her department's wireless access point.
Madison suspects this is some form of social engineering because the IT
director should already have access to that information. What form of social
engineering is possibly being used? Right Ans - Authority Scam
Which of the following is not true of Bluetooth Security modes? Right Ans -
With Bluetooth security modes 1 through 3, no service security trust model is
applied.
Considering the Open Systems Interconnection (OSI) Reference Model layers,
what denial of service (DoS) attack is unique to wireless networks? Right
Ans - Spoofed MAC address sending authenticate requests on the media access
control layer
Bluetooth devices that use which mode are designed and produced with no
security features, making them vulnerable to attack? Right Ans - Security
mode 1
Kun is a junior level accountant in his company. He wanted to use his personal
laptop and tablet for work purposes but could not locate a wireless access
point to which to connect. He brought in a personal access point and
connected it to the corporate network. Sometime later, the company's
cybersecurity expert informed him that sensitive financial information had
been accessed and subsequently sold on the dark web. This activity has been
traced to Kun's access point. What term best describes the unauthorized
access point? Right Ans - Rogue
A malicious attacker is using an inexpensive directional antenna to detect and
monitor a business's wireless network from his car. The vehicle is parked on
the street about 100 yards from the target building. Right Ans - Layer 2
(Data Link Layer)
, Domingo is a network security consultant hired by a multinational
corporation. He is assessing security controls in the client's IT infrastructure.
The client has proof that it has been the victim of a multi-phased attack
carried out by a nation state-backed hacker consortium over the course of 14
months. The group stole highly valuable proprietary information. What kind
of attack is the client describing? Right Ans - Advanced persistent threat
(APT)
Which of the following is not a Bluetooth vulnerability? Right Ans -
Switching off Discovery mode
Ad hoc networks are a known risk in corporate environments. Which of the
following is true of ad hoc networks in a corporate setting? Right Ans - Ad
hoc connections should be avoided whenever possible.
Ashley is a wireless network engineer for a company. She is visiting a branch
office for the first time in several month. She notices that the furniture has
been rearranged and that the trees and shrubs surrounding the building have
been trimmed recently. What is her concern regarding the impact of those
changes on the wireless LAN (WLAN) and radio-frequency (RF) signals?
Right Ans - That the WLAN's RF signal will extend beyond the boundaries of
the building.
The volunteer network technician of a school recently installed wireless
access, granting teachers access to a wireless local area network (WLAN).
After a few weeks, teachers noticed that the online gradebooks had been
tampered with and notified the network technician, who suspected that
students had been eavesdropping on the wireless communications. What
improvement should the network technician make to the WLAN? Right Ans
- Require encryption to be used between devices and the wireless access
points.
A malicious hacker accesses a company's wireless network. The hacker spoofs
a local wireless device by answering a particular type of request, which is then
stored in a table in the network. The spoofed devices is identified as a
legitimate network node because this service does not verify that the
response comes from a legitimate source. What is the name of this service?
Right Ans - Address Resolution Protocol (ARP)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studyhall. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.