Exam 8: Wireless Network Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What is the maximum number of characters that can exist within a SSID name?
(Multiple Choice)
4.8/5
(37)
When using AES-CCMP,the AES-256 bit key requires how many rounds?
(Multiple Choice)
4.9/5
(38)
Which of the following choices is not one of the four types of packets used by EAP?
(Multiple Choice)
4.9/5
(33)
What specific feature on an AP controls how much of the spectrum is available to transfer data?
(Multiple Choice)
4.8/5
(30)
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
(Multiple Choice)
4.8/5
(39)
Discuss the different types of interference one might encounter using wireless devices.
(Essay)
4.8/5
(32)
Which of the following is the most secure form of IEEE 802.1x authentication?
(Multiple Choice)
4.8/5
(27)
Near field communication (NFC)is a set of standards used to establish communication between devices in very close proximity.
(True/False)
4.7/5
(35)
The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.
(True/False)
4.8/5
(42)
What type of radio frequency transmissions are used by Bluetooth devices?
(Multiple Choice)
4.9/5
(36)
What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?
(Essay)
4.9/5
(30)
RFID is commonly used to transmit information between networked computers.
(True/False)
4.9/5
(42)
Wired Equivalent Privacy (WEP)is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
(True/False)
4.8/5
(34)
What type of survey can help a network administrator make decisions about bands,channels,and widths when installing new access points?
(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)