Exam 12: Wireless
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
What is WAP and what are its security implications?
Free
(Essay)
4.9/5
(32)
Correct Answer:
WAP is the data protocol used by many cellular phones to deliver e-mail and lightweight web services.Designers created WTLS as a method to ensure privacy of data being broadcast over WAP.WTLS has a number of inherent security problems,such as weak encryption necessitated by the low computing power of the devices,and the network transition that must occur at the cellular provider's network,or the WAP gap.
WAP implements integrity through the use of
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
NetStumbler is a program that is used to sniff wireless traffic and break WEP keys.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
_______________ encrypts the plaintext data and then sends it over the airwaves as a cipher text.
(Short Answer)
4.9/5
(39)
When an attacker uses Bluetooth to copy e-mails,contact lists,or other files on the device,it is called
(Multiple Choice)
5.0/5
(34)
_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet.
(Multiple Choice)
4.8/5
(41)
Security issues associated with WTLS include which of the following?
(Multiple Choice)
4.9/5
(44)
If unauthorized wireless is set up,it is known as a(n)_______________.
(Short Answer)
4.8/5
(37)
A new standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is
(Multiple Choice)
5.0/5
(36)
Access to actual Ethernet segments is not protected by physical security measures.
(True/False)
4.8/5
(32)
A(n)_______________ is a 802.11 management frame for the network and contains several different fields such as the time stamp and beacon interval.
(Short Answer)
4.7/5
(34)
_______________ protocol can support a wide variety of authentication methods and also fits well into existing authentication systems like RADIUS.
(Short Answer)
4.8/5
(36)
_________ is sending an unauthorized message to another Bluetooth device.
(Multiple Choice)
4.8/5
(31)
Physical access to a machine will enable an attacker to bypass any security measure that has been placed on that machine.
(True/False)
4.8/5
(41)
Showing 1 - 20 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)