Exam 8: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

In a bluesnooping attack,the attacker copies emails,calendars,contact lists,cell phone pictures,or videos by connecting to the Bluetooth device without the owner's knowledge or permission.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

(Multiple Choice)
4.8/5
(41)

The Temporal Key Integrity Protocol (TKIP)encryption technology uses a MIC value that is what length?

(Multiple Choice)
4.8/5
(32)

Select the EAP protocol that uses digital certificates for authentication?

(Multiple Choice)
4.8/5
(31)

For IEEE WLANs,the maximum transmit power is 200 milliwatts (mW).

(True/False)
4.8/5
(30)

How does the WPA Temporal Key Integrity Protocol encryption technology operate?

(Essay)
5.0/5
(29)

Which direction do access point antennas radiate their signals and where should they be located?

(Multiple Choice)
4.9/5
(30)

Describe a piconet.

(Essay)
4.9/5
(35)

Which of the following self-contained APs are autonomous,or independent,because they are separate from other network devices and even other autonomous APs?

(Multiple Choice)
4.9/5
(40)

Which encryption protocol below is used in the WPA2 standard?

(Multiple Choice)
4.8/5
(40)

Explain why it is important to be able to control the power level at which the WLAN transmits.

(Essay)
4.9/5
(37)

RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.

(True/False)
4.7/5
(39)

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?

(Multiple Choice)
4.9/5
(37)

List and describe the major parts of an access point.

(Essay)
4.8/5
(31)

What are the four types of packets used by EAP?

(Essay)
4.9/5
(28)

What is the most common type of wireless access control?

(Essay)
4.8/5
(34)

What device acts like a wireless base station in a network,acting as a bridge between wireless and wired networks?

(Multiple Choice)
4.8/5
(26)

In ad hoc mode,devices can only communicate between themselves and cannot connect to another network.

(True/False)
4.9/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)