Exam 8: Wireless Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

Which organization is supported by wireless network device manufacturers and promoters, including Alvarion, Cisco Systems, ELAN, Intermec, Intersil, Raylink, and Wireless Central?

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

B

In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

By 2006, how many wireless devices are expected to be installed?

(Multiple Choice)
4.8/5
(26)

Radio frequencies are the range of frequencies above _____ kilohertz through which an electromagnetic signal can be radiated into space.

(Multiple Choice)
4.8/5
(38)

Many wireless network users are deploying Bluetooth devices because these devices do not rely on proprietary communications, particularly in the lower (and slower) 902-928 MHz range common to older wireless devices.

(True/False)
4.8/5
(32)

Is an access point usually a router or switch?

(True/False)
4.8/5
(37)

Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?

(True/False)
4.8/5
(21)

What type of device does an attacker use to determine the location of a target wireless network?

(Multiple Choice)
4.9/5
(33)

Does the 802.11a wireless transmission standard operate in the 5-GHz range?

(True/False)
4.9/5
(30)

What is the mail unit of measurement for radio frequencies?

(Multiple Choice)
4.8/5
(33)

  What type of antenna is being used in the figure above? What type of antenna is being used in the figure above?

(Multiple Choice)
4.7/5
(31)

A(n) ____________________ is a device that sends out (radiates or transmits) and picks up (receives) radio waves.

(Short Answer)
4.8/5
(32)

Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?

(True/False)
4.8/5
(35)

____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.

(Short Answer)
4.8/5
(42)

What are the lowest frequencies on which amateur radio operators can transmit?

(Multiple Choice)
4.8/5
(40)

What four general steps are used in the wireless communication authentication process?

(Essay)
4.9/5
(39)

The IBSS topology consists of ad hoc peer-to-peer communications between WNICs on individual computers.

(True/False)
4.8/5
(34)

At what speed must all devices that conform to the 802.11a standard be able to transmit?

(Multiple Choice)
4.7/5
(38)

In 802.11 communications, the shared secret is the SSID key used for encryption and decryption, and the key itself is encrypted.

(True/False)
4.7/5
(32)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)