Exam 7: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.

(True/False)
4.7/5
(32)

The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated

(Multiple Choice)
4.9/5
(34)

The smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.

(Short Answer)
4.7/5
(37)

The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

(True/False)
4.8/5
(39)

You should allow only specific computers to access your wireless network.

(True/False)
4.7/5
(31)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)