Chapter 3 - Cisco Networking Academy

advertisement
Chapter 3
Review Questions
1. _____ involves sending an e-mail or displaying a Web announcement that falsely
claims to be from a legitimate enterprise in an attempt to trick the user into
surrendering information.
a. Phishing
b. Social engineering
c. Resource allocation (RA)
d. Web posting
2. Wireless location mapping refers to passive wireless discovery, also known as
a. wardriving
b. wireless address allocation (WAA)
c. spear driving
d. access point collecting
3. Each of the following is a technique used by wardrivers except
a. Drive at slower speeds
b. Use freeways or Interstate highways
c. Repeat over time
d. Divide the area into sectors
4. Each of the following is a necessary piece of hardware for wardriving except
a. automobile
b. computing device
c. antenna
d. wireless NIC adapter
5. A _____computer that lacks a keyboard.
a. convertible table
b. handheld PC
c. desktop
d. slate tablet
6. Social engineering relies on tricking and deceiving someone to access a system.
True or False?
7. Whereas phishing involves sending millions of generic e-mail messages to users,
spear phishing targets only specific users. True or False?
8. Google phishing involves stealing information from the Google Web site that
contains personal information. True or False?
9. Attackers use search tools to locate information that is no intended for the general
public. True or False?
10. Handheld PCs outsell PDAs by a 2-to-1 margin. True or False?
11. The smallest mobile computing device is a(n) _____, which are handheld devices
that were originally designed strictly as personal organizers but quickly became
more sophisticated. personal digital assistants (PDA),
12. For laptop, tablet and handheld PCs an external wireless NICs can plug into the
_____ port, as either as a standalone device or a key fob. USB
Comment [dk1]: This could arguably
be smartphones now. Rewrite question?
13. A(n) _____is a small card that is functionally equivalent to a standard PCI
expansion card and is used for wireless NIC adapters in laptop computers. mini
PCI
14. Not all chipsets support _____, which is a passive method of receiving WLAN
signals. radio frequency monitoring (RFMON)
15. GPS receivers can deduce their own location based on the mathematical principle
of _____. trilateration
16. Describe the two fundamental characteristics of antennas.
First, as the frequency gets higher the wavelength becomes smaller. This means that
the size of the antenna likewise is smaller. Consider a cellular telephone: it uses a
high frequency so only a small antenna is required. Secondly, as the gain (positive
difference in amplitude between two signals) of an antenna increases, the coverage
area narrows. High-gain antennas offer longer coverage areas than low-gain
antennas at the same input power level.
17. What are the three types of antennas? What type(s) are commonly used to detect
wireless networks?
There are three basic categories of antennas: omni-directional, semi-directional and
highly-directional. The most common type of antenna for a WLAN, whether
wardriving or in standard use, is an omni-directional antenna, also known as a
dipole antenna. An omni-directional antenna detects a from all directions equally.
Unlike an omni-directional antenna that evenly spreads the signal in all directions, a
semi-directional antenna focuses the energy in one direction. Semi-directional
antennas are primarily used for short and medium range remote wireless bridge
networks. Highly-directional antennas send a narrowly focused signal beam.
Highly-directional antennas are generally concave dish-shaped devices. These
antennas are used for long distance, point-to-point wireless links, such as connecting
buildings that are up to 42 kilometers (25 miles) apart. Neither semi-directional or
highly-directional antennas are commonly used for WLAN wardriving.
18. What is a wireless client utility and why were they used?
When WLANs first appeared operating systems were unaware of their presence.
Wireless NIC adapter manufacturers included client software utilities that were
used to detect a wireless signal and then connect to that network. These client
utilities also provided the ability to adjust client parameters, report statistics, and
show signal strength. However, the popularity of client utilities has decreased. Few
wireless NIC adapter manufacturers now include client software utilities to
accompany their hardware. In addition, some of those that do make the utilities
available configure the software not to function unless that vendor’s specific
wireless NIC is installed and functioning in the computer.
19. What is warchalking?
The final step in wardriving is to document and then advertise the location of the
wireless LANs. Early WLAN users copied a system that “hobos” used during the
Great Depression to indicate friendly locations. Wireless networks were identified
by drawing on sidewalks or walls around the area of the network known as
warchalking. This system relied on a series of symbols.
20. How are wireless networks vulnerable to wireless packet sniffers, and how do you
protect against this vulnerability?
Wireless packet sniffers can be used by attackers to capture unencrypted packets
and view their contents. Wireless packet sniffers can reveal usernames and
passwords, SNMP community strings, encryption keys, and MAC addresses. The
best preventative measures for protecting against this data being viewed is to enrypt
the packets before they are transmitted.
Download