Exam 8: Wireless Network Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
In a bluesnooping attack,the attacker copies emails,calendars,contact lists,cell phone pictures,or videos by connecting to the Bluetooth device without the owner's knowledge or permission.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
(Multiple Choice)
4.8/5
(41)
The Temporal Key Integrity Protocol (TKIP)encryption technology uses a MIC value that is what length?
(Multiple Choice)
4.8/5
(32)
Select the EAP protocol that uses digital certificates for authentication?
(Multiple Choice)
4.8/5
(31)
For IEEE WLANs,the maximum transmit power is 200 milliwatts (mW).
(True/False)
4.8/5
(30)
How does the WPA Temporal Key Integrity Protocol encryption technology operate?
(Essay)
5.0/5
(29)
Which direction do access point antennas radiate their signals and where should they be located?
(Multiple Choice)
4.9/5
(30)
Which of the following self-contained APs are autonomous,or independent,because they are separate from other network devices and even other autonomous APs?
(Multiple Choice)
4.9/5
(40)
Which encryption protocol below is used in the WPA2 standard?
(Multiple Choice)
4.8/5
(40)
Explain why it is important to be able to control the power level at which the WLAN transmits.
(Essay)
4.9/5
(37)
RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.
(True/False)
4.7/5
(39)
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?
(Multiple Choice)
4.9/5
(37)
What device acts like a wireless base station in a network,acting as a bridge between wireless and wired networks?
(Multiple Choice)
4.8/5
(26)
In ad hoc mode,devices can only communicate between themselves and cannot connect to another network.
(True/False)
4.9/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)