Exam 9: Wireless Network Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
APs use antennas that radiate a signal in all directions.
Free
(True/False)
4.8/5
(24)
Correct Answer:
True
Discuss how to prevent bluesnarfing.
Free
(Essay)
4.8/5
(37)
Correct Answer:
To prevent bluesnarfing, Bluetooth devices should be turned off when not being used or when in a room with unknown people. Another option is to set Bluetooth on the device as undiscoverable, which keeps Bluetooth turned on, yet it cannot be detected by another device.
Matching
-A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
D
Matching
-An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
(Multiple Choice)
4.7/5
(32)
Matching
-The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.
(Multiple Choice)
4.8/5
(39)
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
(Multiple Choice)
4.8/5
(37)
Which encryption protocol below is used in the WPA2 standard?
(Multiple Choice)
4.9/5
(26)
What is the maximum number of characters that can exist within an SSID name?
(Multiple Choice)
4.8/5
(24)
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?
(Multiple Choice)
4.8/5
(33)
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:
(Multiple Choice)
4.9/5
(24)
Bluetooth devices are not backward compatible with previous versions.
(True/False)
4.7/5
(32)
Matching
-The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
(Multiple Choice)
4.8/5
(27)
Explain why it is important to be able to control the power level at which the WLAN transmits.
(Essay)
4.8/5
(28)
Which of the following choices is not one of the four types of packets used by EAP?
(Multiple Choice)
4.9/5
(38)
A __________________ is an in-depth examination and analysis of a wireless LAN site.
(Short Answer)
4.8/5
(37)
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?
(Multiple Choice)
4.8/5
(36)
An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP, with the intent to redirect client devices.
(True/False)
4.9/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)