Exam 11: Hacking Wireless Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ standard has improvements to address the problem of interference.

(Multiple Choice)
4.8/5
(38)

In 802.11, an addressable unit is called a ____.

(Multiple Choice)
4.9/5
(33)

Each frequency band contains ____; if they overlap, interference could occur.

(Multiple Choice)
4.9/5
(36)

____ uses TLS to authenticate the server to the client but not the client to the server.

(Multiple Choice)
4.8/5
(29)

____ is a freeware tool written for Windows that enables you to detect WLANs using 802.11a, 802.11b, and 802.11g.

(Multiple Choice)
4.8/5
(28)

____ is the tool most hackers wanting to access WEP-enabled WLANs use.

(Multiple Choice)
4.8/5
(27)

Wireless routers are designed so that they do not interfere with wireless telephones.

(True/False)
4.7/5
(34)

In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.

(Multiple Choice)
4.9/5
(30)

A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.

(Essay)
4.8/5
(35)

MATCHING Match each term with the correct statement below. -European WLAN standard

(Multiple Choice)
4.9/5
(33)

One of the default SSIDs used by D-Link is ____.

(Multiple Choice)
4.8/5
(35)

____ Project 802 was developed to create LAN and WAN standards.

(Multiple Choice)
4.8/5
(33)

What is the function of a WG of the IEEE?

(Essay)
4.8/5
(31)

MATCHING Match each term with the correct statement below. -this technology is restricted to a single room or line of sight

(Multiple Choice)
4.8/5
(31)

____ is a product for conducting wardriving attacks written by Mike Kershaw. This product is free and runs on Linux, BSD, Mac OS X, and even Linux PDAs.

(Multiple Choice)
4.8/5
(39)

The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.

(True/False)
4.9/5
(35)

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

(True/False)
4.9/5
(36)

____ defines how data is placed on a carrier signal.

(Multiple Choice)
4.8/5
(32)

MATCHING Match each term with the correct statement below. -addresses wireless MANs for mobile users who are sitting in trains, subways, or cars

(Multiple Choice)
4.8/5
(38)

The first wireless technology standard, ____________________, defined the specifications for wireless connectivity at 1 Mbps and 2 Mbps in a LAN.

(Short Answer)
4.9/5
(26)
Showing 21 - 40 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)