Exam 7: Wireless Network Security
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
A BSSID of all zeros is used as a broadcast address for all nodes on the BSS.
(True/False)
4.9/5
(38)
The primary advantage of the ____ wireless topology configuration is the increased number of connections among stations, which allows greater connectivity.
(Multiple Choice)
4.7/5
(44)
The primary advantage of the ____ wireless topology configuration is the flexibility of the network.
(Multiple Choice)
4.9/5
(30)
Which technology works by taking the original data stream and breaking it up into small bits, then transmitting each of those on a different frequency channel simultaneously?
(Multiple Choice)
4.9/5
(29)
Which wireless modulation technique addresses the transmission of the data stream that has been properly encoded onto the radio signal?
(Multiple Choice)
4.8/5
(38)
Which connectivity model uses a single access point that provides connectivity for a number of clients within a BSS?
(Multiple Choice)
4.7/5
(31)
The ____ of the wireless network is the area the radio signal reaches.
(Multiple Choice)
4.9/5
(35)
The term ____________________ refers to the practice of driving around looking for and mapping insecure WLANs.
(Short Answer)
4.8/5
(34)
A mobile ____________________ is a service usually provided by a wireless telephony service provider to allow users to connect their wireless devices to a specific commercial wireless service.
(Short Answer)
4.8/5
(26)
The basic model of wireless clients within a defined network area is referred to as the ____________________ (BSS).
(Short Answer)
4.8/5
(34)
Which wireless security protocol is considered to be too weak for use inmost network settings?
(Multiple Choice)
4.8/5
(37)
Which wireless modulation technique combines digital and analog signaling to encode data into radio signals?
(Multiple Choice)
4.7/5
(33)
The improved Bluetooth 2.0 increased the data rate to around ____ Mbps.
(Multiple Choice)
4.9/5
(34)
Which group was created to certify the interoperability of 802.11b products?
(Multiple Choice)
4.8/5
(30)
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
-The first standard for ultra-wideband radio technology.
(Short Answer)
4.9/5
(32)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)