Exam 11: Hacking Wireless Networks
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
What protocol improves WPA encryption by adding Message Integrity Checks,Extended Initialization Vectors,Per-packet key mixing,and a Re-keying mechanism to improve encryption?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Which of the following defines how data is placed on a carrier signal?
Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
A
What is WEP,and is it an acceptable way to secure wireless networks?
Free
(Essay)
4.9/5
(36)
Correct Answer:
Wired Equivalent Privacy (WEP),part of the 802.11b standard,was developed to encrypt data traversing a wireless network.For some time,it gave many security professionals a false sense of security that wireless technology could be just as safe as wired networks.Unfortunately,WEP has been torn to shreds by security professionals,professors from major universities,and hackers who post ways to crack WEP encryption.Some argue that WEP is still better than no security at all,and when it's combined with the security of a virtual private network (VPN),they claim that WEP works well for home users or small businesses.Still,many saw a need for a better way to protect WLANs.
What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?
(Multiple Choice)
4.8/5
(36)
Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?
(Multiple Choice)
4.8/5
(28)
Which frequency band is used by commercial AM radio stations?
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-Data is spread across a large-frequency bandwidth instead of traveling across just one frequency band
(Multiple Choice)
4.8/5
(36)
Which of the following protocols is an enhancement to PPP,and was designed to allow a company to select its authentication method?
(Multiple Choice)
4.9/5
(39)
CSMA/CD is implemented at the data link layer on wireless networks.
(True/False)
4.8/5
(39)
Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network?
(Multiple Choice)
4.9/5
(45)
Match each item with a statement below.
-A technology that uses microwave radio band frequencies to transmit data
(Multiple Choice)
4.8/5
(33)
Which of the following EAP methods uses TLS to authenticate the server to the client,but not the client to the server?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)