Exam 8: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the maximum number of characters that can exist within a SSID name?

(Multiple Choice)
4.8/5
(37)

Where does the supplicant send identity information?

(Multiple Choice)
4.9/5
(31)

When using AES-CCMP,the AES-256 bit key requires how many rounds?

(Multiple Choice)
4.9/5
(38)

Which of the following choices is not one of the four types of packets used by EAP?

(Multiple Choice)
4.9/5
(33)

What specific feature on an AP controls how much of the spectrum is available to transfer data?

(Multiple Choice)
4.8/5
(30)

Select the device that is designed to exclusively monitor the RF frequency for network transmissions?

(Multiple Choice)
4.8/5
(39)

Discuss the different types of interference one might encounter using wireless devices.

(Essay)
4.8/5
(32)

Which of the following is the most secure form of IEEE 802.1x authentication?

(Multiple Choice)
4.8/5
(27)

What is the Message Integrity Check (MIC)within WPA used for?

(Essay)
4.7/5
(36)

Near field communication (NFC)is a set of standards used to establish communication between devices in very close proximity.

(True/False)
4.7/5
(35)

The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.

(True/False)
4.8/5
(42)

What type of radio frequency transmissions are used by Bluetooth devices?

(Multiple Choice)
4.9/5
(36)

What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?

(Essay)
4.9/5
(30)

Discuss how to prevent bluesnarfing.

(Essay)
4.8/5
(36)

What is the maximum range of most Bluetooth 5 devices?

(Multiple Choice)
4.8/5
(37)

RFID is commonly used to transmit information between networked computers.

(True/False)
4.9/5
(42)

The current Bluetooth version is Bluetooth 6.

(True/False)
4.8/5
(43)

What is the maximum transmission power for IEEE WLANs?

(Multiple Choice)
4.8/5
(31)

Wired Equivalent Privacy (WEP)is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.

(True/False)
4.8/5
(34)

What type of survey can help a network administrator make decisions about bands,channels,and widths when installing new access points?

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)