Exam 10: Managing the Wireless Network
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B
In a WIPS, signatures, instead of being used for attack detection, are only used to provide additional details about the attack itself.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
The nearest sensor method can locate a client to within a ____ meter area.
(Multiple Choice)
4.9/5
(38)
Global positioning systems (GPS) are widely used in 802.11 WLANs.
(True/False)
4.8/5
(33)
The ____________________ governs the privacy of personal health information.
(Short Answer)
4.7/5
(36)
____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.
(Multiple Choice)
4.8/5
(32)
A ____ constantly monitors the radio frequency (using wireless probes) for attacks.
(Multiple Choice)
4.8/5
(36)
A more proactive approach than intrusion detection is a(n) ____.
(Multiple Choice)
4.9/5
(31)
Both SNMP and WLAN management systems contain tools to perform three important management functions: network discovery, ____, and configuration.
(Multiple Choice)
4.7/5
(31)
____ uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself.
(Multiple Choice)
4.9/5
(27)
The ____ is a signal that tells the strength of the incoming (received) signal.
(Multiple Choice)
4.9/5
(39)
A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.
(Multiple Choice)
4.8/5
(32)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.
(Multiple Choice)
4.9/5
(36)
In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.
(Multiple Choice)
4.8/5
(47)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)