Exam 8: Wireless Network Security
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
A(n) ____ acts as the "base station" for the wireless network.
(Multiple Choice)
4.8/5
(25)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(33)
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
(Multiple Choice)
4.9/5
(37)
Bluetooth devices are not backward compatible with previous versions.
(True/False)
4.8/5
(29)
Bluetooth is a ____ technology designed for data communication over short distances.
(Multiple Choice)
5.0/5
(43)
Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.
(Essay)
4.9/5
(42)
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.
(Multiple Choice)
4.8/5
(31)
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
(Multiple Choice)
4.8/5
(38)
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.
(Multiple Choice)
4.8/5
(35)
____ requires mutual authentication used for WLAN encryption using Cisco client software.
(Multiple Choice)
4.7/5
(27)
____ allow a single access point to service different types of users.
(Multiple Choice)
4.9/5
(46)
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
(Multiple Choice)
4.9/5
(39)
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
(Multiple Choice)
4.8/5
(28)
If the EAP authentication is successful, a success packet is sent to the ____________________.
(Short Answer)
4.9/5
(27)
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
(Multiple Choice)
4.9/5
(28)
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
(Short Answer)
4.9/5
(36)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)