Exam 11: Hacking Wireless Networks
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-Data packets are spread simultaneously over multiple frequencies instead of hopping to other frequencies
(Multiple Choice)
4.8/5
(38)
The 802.11b standard introduced Wired Equivalent Privacy (WEP),which gave many users a false sense of security that data traversing the WLAN was protected.
(True/False)
4.8/5
(42)
What is the 1 to 32 character configurable name used to identify a WLAN?
(Multiple Choice)
4.9/5
(37)
Match each item with a statement below.
-An enhancement to PPP,that was designed to allow a company to select its authentication method
(Multiple Choice)
4.8/5
(35)
In 802.1X,what component refers specifically to the wireless user attempting access to a WLAN?
(Multiple Choice)
4.8/5
(30)
Which of the following terms is the rate at which a sound wave repeat?
(Multiple Choice)
4.7/5
(39)
Which of the following is a utility that is a wireless network detector,sniffer,and an intrusion detection system?
(Multiple Choice)
4.9/5
(29)
What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
(Multiple Choice)
4.8/5
(34)
It is possible to have a wireless network that does not connect to a wired network.
(True/False)
5.0/5
(35)
If an organization does not want to rely on a wireless device to authenticate users,which of the following is a secure alternative?
(Multiple Choice)
4.7/5
(47)
What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?
(Multiple Choice)
4.9/5
(32)
What standard specifically defines the process of authenticating and authorizing users on a network?
(Multiple Choice)
4.7/5
(33)
Match each item with a statement below.
-Defines how data is placed on a carrier signal
(Multiple Choice)
4.8/5
(26)
Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges?
(Multiple Choice)
4.9/5
(44)
Match each item with a statement below.
-Technology is restricted to a single room or line of sight because this light spectrum cannot penetrate walls
(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)