Exam 11: Hacking Wireless Networks
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
The ____ standard has improvements to address the problem of interference.
(Multiple Choice)
4.8/5
(38)
Each frequency band contains ____; if they overlap, interference could occur.
(Multiple Choice)
4.9/5
(36)
____ uses TLS to authenticate the server to the client but not the client to the server.
(Multiple Choice)
4.8/5
(29)
____ is a freeware tool written for Windows that enables you to detect WLANs using 802.11a, 802.11b, and 802.11g.
(Multiple Choice)
4.8/5
(28)
____ is the tool most hackers wanting to access WEP-enabled WLANs use.
(Multiple Choice)
4.8/5
(27)
Wireless routers are designed so that they do not interfere with wireless telephones.
(True/False)
4.7/5
(34)
In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.
(Multiple Choice)
4.9/5
(30)
A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.
(Essay)
4.8/5
(35)
MATCHING
Match each term with the correct statement below.
-European WLAN standard
(Multiple Choice)
4.9/5
(33)
____ Project 802 was developed to create LAN and WAN standards.
(Multiple Choice)
4.8/5
(33)
MATCHING
Match each term with the correct statement below.
-this technology is restricted to a single room or line of sight
(Multiple Choice)
4.8/5
(31)
____ is a product for conducting wardriving attacks written by Mike Kershaw. This product is free and runs on Linux, BSD, Mac OS X, and even Linux PDAs.
(Multiple Choice)
4.8/5
(39)
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
(True/False)
4.9/5
(35)
There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
(True/False)
4.9/5
(36)
MATCHING
Match each term with the correct statement below.
-addresses wireless MANs for mobile users who are sitting in trains, subways, or cars
(Multiple Choice)
4.8/5
(38)
The first wireless technology standard, ____________________, defined the specifications for wireless connectivity at 1 Mbps and 2 Mbps in a LAN.
(Short Answer)
4.9/5
(26)
Showing 21 - 40 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)