CompTIA Security Plus Mock Test Q1513

In the course of troubleshooting wireless issues from users a technician discovers that users are connecting to their home SSIDs which the technician scans but detects none of these SSIDs. The technician eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless use while mitigating this type of attack?

A. Configure the device to verify access point MAC addresses
B. Disable automatic connection to known SSIDs
C. Only connect to trusted wireless networks
D. Enable MAC filtering on the wireless access point

Correct Answer: A
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1505

A security administrator is using a software program to test the security of a wireless access point. After running the program for a few hours, the access point sends the wireless secret key back to the software program. Which of the following attacks is this an example of?

C. Deauth
D. Replay

Correct Answer: C
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1428

A security administrator wishes to prevent certain company devices from using specific access points, while still allowing them on others. All of the access points use the same SSID and wireless password. Which of the following would be MOST appropriate in this scenario?

A. Require clients to use 802.1x with EAPOL in order to restrict access
B. Implement a MAC filter on the desired access points
C. Upgrade the access points to WPA2 encryption
D. Use low range antennas on the access points that ne4ed to be restricted

Correct Answer: B
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1394

A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization. Some users however are using the Ethernet port in personal laptops to the wired network. Which of the following could an administrator use to ensure that unauthorized devices are not allowed to access the wired network?

A. VLAN access rules configured to reject packets originating from unauthorized devices
B. Router access lists configured to block the IP addresses of unauthorized devices
C. Firewall rules configured to block the MAC addresses of unauthorized devices
D. Port security configured shut down the port when unauthorized devices connect

Correct Answer: D
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1389

A wireless site survey has been performed at a company. One of the results of the report is that the wireless signal extends too far outside the building. Which of the following security issues could occur as a result of this finding?

A. Excessive wireless access coverage
B. Interference with nearby access points
C. Exhaustion of DHCP address pool
D. Unauthorized wireless access

Correct Answer: D
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1303

While troubleshooting a new wireless 802.11 ac network an administrator discovers that several of the older systems cannot connect. Upon investigation the administrator discovers that the older devices only support 802.11 and RC4. The administrator does not want to affect the performance of the newer 802.11 ac devices on the network. Which of the following should the administrator do to accommodate all devices and provide the MOST security?

A. Disable channel bonding to allow the legacy devices and configure WEP fallback
B. Configure the AP in protected mode to utilize WPA2 with CCMP
C. Create a second SSID on the AP which utilizes WPA and TKIP
D. Configure the AP to utilize the 5Gh band only and enable WEP

Correct Answer: B
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1269

A technician has been tasked with installing and configuring a wireless access point for the engineering department. After the AP has been installed, there have been reports the employees from other departments have been connecting to it without approval. Which of the following would BEST address these concerns?

A. Change the SSID of the AP so that it reflects a different department, obscuring its ownership
B. Implement WPA2 encryption in addition to WEP to protect the data-in-transit
C. Configure the AP to allow only to devices with pre-approved hardware addresses
D. Lower the antenna’s power so that it only covers the engineering department’s offices

Correct Answer: D
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1233

While an Internet café a malicious user is causing all surrounding wireless connected devices to have intermittent and unstable connections to the access point. Which of the following is MOST likely being used?

A. Evil Twin
B. Interference
C. Packet sniffer
D. Rogue AP

Correct Answer: D
Section: Mixed Questions

CompTIA Security Plus Mock Test Q1230

Ann is traveling for business and is attempting to use the hotel’s wireless network to check for new messages. She selects the hotel’s wireless SSID from a list of networks and successfully connects. After opening her email client and waiting a few minutes, the connection times out. Which of the following should Ann do to retrieve her email messages?

A. Change the authentication method for her laptop’s wireless card from WEP to WPA2
B. Open a web browser and authenticate using the captive portal for the hotel’s wireless network
C. Contact the front desk and have the MAC address of her laptop added to the MAC filter on the hotel’s wireless network
D. Change the incoming email protocol from IMAP to POP3

Correct Answer: B
Section: Mixed Questions