Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I want ansewr this Q,please 1. Which technology is predominately used for contac

ID: 3734750 • Letter: I

Question

I want ansewr this Q,please

1. Which technology is predominately used for contactless payment systems?

a. Near field communication (NFC)

b. Wireless local area network (WLAN)

c. Bluetooth

d. Radio Frequency ID (RFID)

2. Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?

a. Bluesnarfing

b. Bluejacking

c. Bluecreeping

d. Bluestealing

3. What is a difference between NFC and RFID?

a. NFC is based on wireless technology while RFID is not.

b. RFID is faster than NFC.

c. RFID is designed for paper-based tags while NFC is not.

d. NFC devices cannot pair as quickly as

4. Which of these technologies is NOT found in a wireless router?

a. Access point

b. Router

c. Dynamic host configuration protocol (DHCP) server

d. Firewall

5. Why is a rogue AP a security vulnerability?

a. It uses the weaker IEEE 80211i protocol.

b. It conflicts with other network firewalls and can cause them to become disabled.

c. It allows an attacker to bypass network security configurations.

d. It requires the use of vulnerable wireless probes on all mobile devices

6. Which of these is NOT a risk when a home wireless router is not securely configured?

a. Only a small percentage of the total traffic can be encrypted.

b. An attacker can steal data from any folder with file sharing enabled.

c. User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.

d. Malware can be injected into a computer connected to the WLAN.

7. Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

a. Push-button method

b. PIN method

c. Piconet method

d. NFC method

8. Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?

a. Captive portal

b. Web-based portal

c. Rogue portal

d. Authenticated portal

9. Which of the following is NOT a wireless peripheral protection option?

a. Update or replacing any vulnerable device

b. Switch to a more fully tested Bluetooth model

c. Install a network sensor to detect an attack

d. Substitute a wired device

10. The primary design of a(n) _____ is to capture the transmissions from legitimate users.

a. rogue access point

b. WEP

c. evil twin

d. Bluetooth grabber

Explanation / Answer

1.

Option a correct.

Near field communication (NFC) technology is predominately used for contactless payment systems.

2.

Option a correct.

Bluesnarfing unauthorized information through a Bluetooth connection.

3.

Option a correct.

NFC is based on wireless technology while RFID is not.

4.

Option c correct.

Dynamic host configuration protocol (DHCP) server is NOT found in a wireless router.

5.

Option c correct.

A rogue AP a security vulnerability It allows an attacker to bypass many of the network security configurations.

6.

Option a correct.

Risk when a home wireless router is not securely configured :

7.

Option b correct.

PIN method Wi-Fi Protected Setup (WPS) methods is vulnerable.

8.

Option a correct.

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. Captive portal of AP has he encountered.

9.

Option d correct.

wireless peripheral protection option :

10.

Option c correct.

The primary design of a(n) evil twin is to capture the transmissions from legitimate users.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote