Exam 1: Foundations of Wireless Security
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.
(Multiple Choice)
4.8/5
(26)
Wireless LAN applications can be found in every industry whose employees need or want to conduct business without being confined to a specific location.
(True/False)
4.7/5
(29)
In the United States, the organization that controls and regulates wireless transmissions for use by citizens (as opposed to the federal government) is the ____.
(Multiple Choice)
4.8/5
(32)
Educational institutions were some of the first adopters of WLANs because of their dramatic advantages in teaching and learning.
(True/False)
4.8/5
(40)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(34)
Individuals who actively search for wireless signals to pick up, often by simply driving down the street, are participating in an activity known as ____.
(Multiple Choice)
4.8/5
(40)
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.
(Multiple Choice)
4.9/5
(32)
The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.
(Multiple Choice)
4.9/5
(33)
How does the speed of attacks factor make security increasingly difficult?
(Essay)
4.9/5
(30)
In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.
(Multiple Choice)
4.9/5
(39)
Typically all rogue access points have security features implemented.
(True/False)
4.8/5
(36)
What are some of the characteristics of information that must be protected by information security?
(Essay)
4.8/5
(38)
Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)