Page 798 - StudyBook.pdf
P. 798
782 Appendix • Self Test Appendix
Answer C is correct. If your company is using WEP (Wired Equivalent Privacy) for its wireless
security, only those users with the correct or valid WEP key can authenticate at the access
point.Answers A, B and D are incorrect.
12. What is the purpose of conducting a wireless network site survey?
A. To identify other wireless networks in the area.
B. To determine the extent to which your wireless network extends beyond the physical
boundary of the building.
C. To hack into other companies’ wireless networks.
D. All of the above
B is correct.The purpose of a site survey is to determine both the extent to which your wire-
less network is visible beyond the building in which it is located, and the strength of the secu-
rity of your wireless network.Answer A is incorrect.While one of the results of conducting a
wireless network site survey will be the determination of other wireless networks in the area, it
is not the primary intent of the survey.Answer C is incorrect because hacking into other com-
panies’ wireless networks is not the intent of a legal wireless site survey.Answer D is incorrect.
13. This tool is used during site surveys to detect possible interference in RF bands. It can also be
used by an attacker to eaves drop on communications session.What is it?
A. Spectrum Analyzer
B. Spectrum Packet Sniffer
C. Spectrum Monitor
D. Spectrum War Driver
Answer A is correct. Certified site survey technicians use spectrum analyzers to detect potential
interference between RF bands.This tool can also be used by an attacker to eaves drop on
communications session.Answer B is incorrect. However,A Packet Sniffer is a program or
device that collects and monitors data packets on a network.Answers C and D are invalid.
14. You have just started your new job as security technician for a company.Your director informs
you that several developers and the network administrator have left the company as disgrun-
tled employees. No one has been keeping track of security and your director believes the
former employees have been violating company policy by accessing company information
through the wireless network.You conduct a site survey and expect to find what as the
number one culprit?
A. Compromised company data
B. Wireless security breaches
C. Unauthorized APs on the network
D. None of the above
www.syngress.com