Exam 7: Wireless Networking

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To protect a Bluetooth device from "bluejacking," you can set it to ____________________ mode.

(Short Answer)
4.8/5
(34)

A "cafe latte" attack is another name for a(n) ____ attack.

(Multiple Choice)
4.8/5
(34)

When WEP is enabled, it encrypts data sent over a network using a key, sometimes also called a(n) passphrase, that is entered by the user. _________________________

(True/False)
4.8/5
(35)

MATCHING -a relatively harmless attack that merely sends an anonymous message

(Multiple Choice)
4.8/5
(30)

WEP and WPA both can use a 128-bit key to encrypt data.

(True/False)
4.8/5
(37)

Because the 2.4 Ghz radio spectrum is ____________________, it is free.

(Short Answer)
4.9/5
(36)

Name at least 5 of the 8 things noted in the security checklist for installing a wireless router or access point.

(Essay)
4.9/5
(26)

Infrared technology uses ____________________ to carry data.

(Short Answer)
4.9/5
(34)

Wired Passphrase Encryption (WPE) is a security protocol for wireless LANs that works by encrypting data sent over the network.

(True/False)
4.8/5
(36)

In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.

(Multiple Choice)
4.7/5
(35)

WWAN networking provides wireless connections to the Internet using networks created by cellular phone carriers.

(True/False)
4.7/5
(28)

A(n) ____________________ is a hardware device with one or more antennae that permit communication between wired and wireless networks so wireless clients can send and receive data.

(Short Answer)
4.8/5
(36)

MATCHING -an area of Wi-Fi network coverage

(Multiple Choice)
4.8/5
(38)

If you have both WPA and WEP available to you, your system will be most secure if you use ____.

(Multiple Choice)
4.8/5
(38)

A WiMAX coverage area between the base station and devices varies based on the geography of the area, but most of these hotspots are approximately ____ square miles.

(Multiple Choice)
4.9/5
(26)

When you see the term "Wi-Fi," it most often refers to the 802.11 ____ standard.

(Multiple Choice)
4.9/5
(35)

Phishing is the act of driving through a neighborhood looking for unsecured wireless networks.

(True/False)
4.7/5
(37)

Text messages were first made available to cell phone users with the advent of ____ technology.

(Multiple Choice)
4.9/5
(30)

The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and its functions without the owner's consent.

(Multiple Choice)
4.7/5
(38)

  -In the accompanying figure, Box E. should show a data transfer rate of up to ____ Mbps. -In the accompanying figure, Box "E." should show a data transfer rate of up to ____ Mbps.

(Multiple Choice)
4.8/5
(31)
Showing 121 - 140 of 147
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)