Exam 8: Wireless Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?
Free
(True/False)
4.9/5
(30)
Correct Answer:
True
Which organization is supported by wireless network device manufacturers and promoters, including Alvarion, Cisco Systems, ELAN, Intermec, Intersil, Raylink, and Wireless Central?
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
B
In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
By 2006, how many wireless devices are expected to be installed?
(Multiple Choice)
4.8/5
(26)
Radio frequencies are the range of frequencies above _____ kilohertz through which an electromagnetic signal can be radiated into space.
(Multiple Choice)
4.8/5
(38)
Many wireless network users are deploying Bluetooth devices because these devices do not rely on proprietary communications, particularly in the lower (and slower) 902-928 MHz range common to older wireless devices.
(True/False)
4.8/5
(32)
Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?
(True/False)
4.8/5
(21)
What type of device does an attacker use to determine the location of a target wireless network?
(Multiple Choice)
4.9/5
(33)
Does the 802.11a wireless transmission standard operate in the 5-GHz range?
(True/False)
4.9/5
(30)
What is the mail unit of measurement for radio frequencies?
(Multiple Choice)
4.8/5
(33)
A(n) ____________________ is a device that sends out (radiates or transmits) and picks up (receives) radio waves.
(Short Answer)
4.8/5
(32)
Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?
(True/False)
4.8/5
(35)
____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.
(Short Answer)
4.8/5
(42)
What are the lowest frequencies on which amateur radio operators can transmit?
(Multiple Choice)
4.8/5
(40)
What four general steps are used in the wireless communication authentication process?
(Essay)
4.9/5
(39)
The IBSS topology consists of ad hoc peer-to-peer communications between WNICs on individual computers.
(True/False)
4.8/5
(34)
At what speed must all devices that conform to the 802.11a standard be able to transmit?
(Multiple Choice)
4.7/5
(38)
In 802.11 communications, the shared secret is the SSID key used for encryption and decryption, and the key itself is encrypted.
(True/False)
4.7/5
(32)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)