Exam 7: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

QPSK uses four signal states that are ____ degrees out of phase to carry four signal values.

Free
(Multiple Choice)
4.8/5
(24)
Correct Answer:
Verified

C

Ad hoc wireless models rely on the existence of ____ to provide connectivity.

Free
(Multiple Choice)
5.0/5
(41)
Correct Answer:
Verified

C

Why is SSID hiding considered to be a security myth?

Free
(Essay)
5.0/5
(28)
Correct Answer:
Verified

The usual advice is to have the administrator disable the WAP's SSID beaconing ability. The thinking is that, then, attackers are unable to discover the wireless network and, therefore, won't attack it. Unfortunately, tools like Kismet or NetStumbler make it incredibly easy to scan the local area in order to find wireless networks, regardless of whether or not they actively advertise their SSIDs via beaconing.

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -A "wrapper"used to enhance the WEP protocol.

(Short Answer)
4.8/5
(37)

The use of ____ is required to achieve RSN compliance.

(Multiple Choice)
4.9/5
(41)

Most BSS networks are configured as simple stars.

(True/False)
4.9/5
(31)

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -A WPAN standard used for monitoring and control devices.

(Short Answer)
4.9/5
(40)

What are the two general principles to keep in mind when securing Bluetooth-enabled devices?

(Essay)
4.8/5
(40)

What is the branding name for interoperable equipment that is capable of supporting IEEE 802.11i requirements?

(Multiple Choice)
4.7/5
(32)

Which notable Bluetooth attack allows a nearby attacker to issue commands to an unsuspecting target phone?

(Multiple Choice)
4.8/5
(36)

Describe the point-to-point wireless network model.

(Essay)
4.8/5
(37)

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -The radio transmitter/receiver that takes the signal from the wired network and broadcasts it to wireless receivers, and vice versa.

(Short Answer)
4.8/5
(34)

____________________ is the latest roaming implementation for wide-scale wireless networking.

(Short Answer)
4.8/5
(35)

List four differences between wireless networks and networks that use physical media like wires or cables.

(Essay)
4.8/5
(41)

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -A standard for devices in facilities that are geographically dispersed.

(Short Answer)
4.9/5
(35)

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -A security protocol created by the Wi-Fi Alliance that called for supporting the Advanced Encryption Standard (AES).

(Short Answer)
4.7/5
(33)

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -A wireless protocol created by CISCO for its devices in order to provide an additional security layer to networks using WEP.

(Short Answer)
4.8/5
(31)

A(n) ____________________ is a network that only allows connections that are Robust Security Network Associations (RSNAs) - in other words, wireless connections that provide encryption to protect against WLAN security threats.

(Essay)
4.9/5
(29)

Describe the hybrid wireless topology.

(Essay)
4.8/5
(43)

Match each item with a statement below. a.WPA f.ZigBee b.Bluetooth g.WAP c.WiMAX h.TKIP d.WiMedia i.Wi-Fi e.Leap authentication -The branding label for a wireless local area network (WLAN).

(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)