Exam 10: Managing the Wireless Network
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
Monitoring the RF frequency requires a special sensor called a(n) ____.
(Multiple Choice)
4.8/5
(32)
A(n) ____ probe uses existing access points to monitor the RF.
(Multiple Choice)
4.8/5
(32)
WIPS detect categories of attacks using predictable or ____ techniques that may involve a combination of different approaches.
(Multiple Choice)
4.9/5
(37)
A(n) ____ probe uses dedicated probes for scanning the RF for attacks.
(Multiple Choice)
4.8/5
(39)
All wireless network interface card adapters can act as a wireless device probe.
(True/False)
4.9/5
(31)
A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.
(Multiple Choice)
4.8/5
(37)
A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.
(Short Answer)
4.9/5
(34)
____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
(Short Answer)
4.7/5
(38)
An SNMP ____________________ acknowledges the message with an SNMP response.
(Short Answer)
4.9/5
(38)
____ allows computers and network equipment to gather data about network performance.
(Multiple Choice)
4.7/5
(38)
Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.
(Essay)
4.8/5
(35)
A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.
(Multiple Choice)
4.8/5
(29)
Wireless network bandwidth is less than that of a wired network.
(True/False)
4.7/5
(31)
The ____ Act covers corporate governance, financial disclosure, and the practice of public accounting.
(Multiple Choice)
4.9/5
(33)
If SNMP is being used, monitoring often focuses upon the performance of the network.
(True/False)
4.9/5
(30)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)