Exam 9: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

APs use antennas that radiate a signal in all directions.

Free
(True/False)
4.8/5
(24)
Correct Answer:
Verified

True

Discuss how to prevent bluesnarfing.

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

To prevent bluesnarfing, Bluetooth devices should be turned off when not being used or when in a room with unknown people. Another option is to set Bluetooth on the device as undiscoverable, which keeps Bluetooth turned on, yet it cannot be detected by another device.

Matching -​A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

D

Matching -An attack that accesses unauthorized information from a wireless device through a Bluetooth connection​

(Multiple Choice)
4.7/5
(32)

What are the four types of packets used by EAP?

(Essay)
4.8/5
(37)

Matching -The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.​

(Multiple Choice)
4.8/5
(39)

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

(Multiple Choice)
4.8/5
(37)

Which encryption protocol below is used in the WPA2 standard?

(Multiple Choice)
4.9/5
(26)

Describe a piconet.

(Essay)
4.9/5
(43)

What is the maximum number of characters that can exist within an SSID name?

(Multiple Choice)
4.8/5
(24)

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?

(Multiple Choice)
4.8/5
(33)

Identify and describe two types of wireless probes.

(Essay)
4.7/5
(23)

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:

(Multiple Choice)
4.9/5
(24)

Bluetooth devices are not backward compatible with previous versions.

(True/False)
4.7/5
(32)

Matching -The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.​

(Multiple Choice)
4.8/5
(27)

Explain why it is important to be able to control the power level at which the WLAN transmits.

(Essay)
4.8/5
(28)

Which of the following choices is not one of the four types of packets used by EAP?

(Multiple Choice)
4.9/5
(38)

​A __________________ is an in-depth examination and analysis of a wireless LAN site.

(Short Answer)
4.8/5
(37)

Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?

(Multiple Choice)
4.8/5
(36)

An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP​, with the intent to redirect client devices.

(True/False)
4.9/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)