Exam 12: Operational Support and Wireless Convergence
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
All networks require effective operational support to ensure that everything functions as intended.
(True/False)
4.9/5
(35)
WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.
(True/False)
4.7/5
(24)
The ____ is an interim step between 2G and 3G digital cellular networks.
(Multiple Choice)
4.7/5
(38)
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.
(Multiple Choice)
4.9/5
(35)
IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.
(Multiple Choice)
4.8/5
(45)
A ____ constantly monitors the radio frequency for attacks.
(Multiple Choice)
4.8/5
(29)
WPA replaces WEP with an encryption technology called ____.
(Multiple Choice)
4.8/5
(32)
A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.
(Short Answer)
4.7/5
(35)
A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
(True/False)
4.9/5
(37)
What are the characteristics of 3G technology for data communications?
(Essay)
4.8/5
(35)
The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.
(Multiple Choice)
4.8/5
(41)
A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.
(Multiple Choice)
4.9/5
(45)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(26)
The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.
(Multiple Choice)
4.8/5
(31)
With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.
(Multiple Choice)
4.8/5
(30)
In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.
(Multiple Choice)
4.8/5
(33)
A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
(Short Answer)
4.7/5
(44)
____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.
(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)