Copyright Goodheart-Willcox Co., Inc. 467 ■ ■ Examples of threats to wireless security include replay attacks, evil twin routers, Bluejacking, Bluesnarfing, disassociation attacks, jamming, RFID attacks, NFC attacks, initialization vector (IV) attacks, and wireless crackers. REVIEW QUESTIONS 1. Define wireless network security. 2. Why is Wired Equivalent Privacy (WEP) not recommended for wireless security? 3. Identify the three main methods for enabling Wi-Fi Protected Setup (WPS). 4. Briefly explain five of the authentication techniques for Wi-Fi Protected Access II WPA2. 5. Define Wi-Fi Protected Access III (WPA3) and identify what it was designed to accomplish. 6. Identify elements of establishing wireless installations. 7. Briefly explain two general types of site surveys. 8. Differentiate between a fat access point and a thin access point. 9. Define band. 10. To ensure proper coverage, where should an AP be placed for omnidirectional and unidirectional signaling? 11. Explain advantages and vulnerabilities of four different wireless connection methods. 12. What is the latest generation of cellular connectivity and what is it expected to provide? 13. What is the radio frequency (RF) spectrum? 14. State the difference between narrowband and broadband. 15. What is the cause of wireless vulnerabilities? 16. Identify and explain types of wireless vulnerabilities to consider and monitor. 17. List potential threats to wireless security. 18. What type of wireless attack involves a hacker capturing login credentials during an initial attack, storing them, and retransmitting them at another time? 19. What steps can be taken to protect a device and data from Bluesnarfing? 20. Define near-field communication (NFC). SAMPLE SECURITY+ EXAM QUESTIONS 1. Which of the following security methods would enable a hotel chain to require that guests enter their room information before being connected to the wireless network? A. WPA2-PSK B. 802.1X C. Captive portal D. WPA3-SAE