Exam 10: Managing the Wireless Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

B

In a WIPS, signatures, instead of being used for attack detection, are only used to provide additional details about the attack itself.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

The nearest sensor method can locate a client to within a ____ meter area.

(Multiple Choice)
4.9/5
(38)

Global positioning systems (GPS) are widely used in 802.11 WLANs.

(True/False)
4.8/5
(33)

The ____________________ governs the privacy of personal health information.

(Short Answer)
4.7/5
(36)

____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.

(Multiple Choice)
4.8/5
(32)

A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

(Multiple Choice)
4.8/5
(36)

A more proactive approach than intrusion detection is a(n) ____.

(Multiple Choice)
4.9/5
(31)

Both SNMP and WLAN management systems contain tools to perform three important management functions: network discovery, ____, and configuration.

(Multiple Choice)
4.7/5
(31)

____ uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself.

(Multiple Choice)
4.9/5
(27)

The ____ is a signal that tells the strength of the incoming (received) signal.

(Multiple Choice)
4.9/5
(39)

How does the nearest sensor method work?

(Essay)
4.9/5
(27)

What is the key to wireless probes?

(Essay)
4.9/5
(32)

A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.

(Multiple Choice)
4.8/5
(32)
Match each item with an statement below:
most basic method for identifying and locating a rogue access point.
Intrusion prevention system
simplest wireless device discovery method.
Wireless intrusion prevention system (WIPS)
device that can monitor the airwaves for traffic.
Gramm-Leach-Bliley Act (GLBA)
Correct Answer:
Verified
Premises:
Responses:
most basic method for identifying and locating a rogue access point.
Intrusion prevention system
simplest wireless device discovery method.
Wireless intrusion prevention system (WIPS)
device that can monitor the airwaves for traffic.
Gramm-Leach-Bliley Act (GLBA)
attempts to uncover and prevent an attack before it harms the WLAN.
Nearest sensor
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
SNMP
standard network management protocol for wired networks.
False positives
designed to exclusively monitor the RF frequency for transmissions.
Dedicated probe
designed to stop an attack from occurring.
Mobile sniffing audit
false attack alerts.
Wireless probe
(Matching)
4.9/5
(33)

What are the advantages and disadvantages of using SNMP for WLANs?

(Essay)
5.0/5
(32)

A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

(Multiple Choice)
4.9/5
(36)

In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

(Multiple Choice)
4.8/5
(47)

What are the steps to perform a mobile sniffing audit?

(Essay)
4.9/5
(45)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)