Copyright Goodheart-Willcox Co., Inc. 468 2. Which of the following would best enable you to identify any unauthorized devices on your network? A. Perform a wireless site survey. B. Analyze the network traffic. C. Put your Bluetooth device in discovery mode to determine other devices. D. Hide all known SSIDs and search for those broadcasting names. 3. Which of the following concerns specifically relates to 5G connections? A. It is more software dependent and vulnerable to attacks against code. B. It is more susceptible to DoS attacks than its predecessors. C. It uses a strong encryption, but a weak authentication method. D. It uses an unlicensed area of the spectrum. 4. In addition to changing the SSID and password information, what is the best thing to do to secure a router? A. Add shielding to the router. B. Install a captive portal. C. Use MAC address filtering. D. Keep firmware up to date. 5. Which of the following would be the most advanced encryption method for use in a business? A. WPA2—AES B. WPA3—SAE C. WPA3—Enterprise D. 802.1X 6. Why is MAC filtering not a true security measure? A. It is not possible to enter all MAC entries in the wireless router. B. A MAC address can be spoofed, thus bypassing the configuration. C. It is only a temporary measure. D. It only applies to Windows and Linux devices, not iOS-based tablets or smartphones. 7. In a situation where two routers have the same SSID, but not the same ESS, the routers are said to be: A. Incompatible B. Evil twins C. BSS devices D. Poisoned 8. What attack may a hacker use to force the user to connect to an evil twin? A. Jamming B. Replay attacks C. Bluejacking D. Disassociation