Exam 9: Wireless Network Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Matching
-An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.
(Multiple Choice)
5.0/5
(37)
Which option below is responsible for the issuing of EAP request packets?
(Multiple Choice)
4.7/5
(41)
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?
(Multiple Choice)
4.8/5
(33)
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
(Short Answer)
4.8/5
(34)
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?
(Multiple Choice)
4.9/5
(36)
Matching
-Searching for wireless signals from an automobile or on foot using a portable computing device
(Multiple Choice)
4.8/5
(38)
When using AES-CCMP, the AES-256 bit key requires how many rounds?
(Multiple Choice)
4.9/5
(36)
What is the role of the IEEE in computer networking and wireless communications?
(Essay)
4.8/5
(36)
Slave devices that are connected to a piconet and are sending transmissions are known as what?
(Multiple Choice)
5.0/5
(36)
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
(True/False)
4.9/5
(43)
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
(Multiple Choice)
4.9/5
(38)
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
(Multiple Choice)
4.8/5
(27)
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
(Short Answer)
4.8/5
(27)
Matching
-Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.
(Multiple Choice)
4.8/5
(25)
Matching
-A 24-bit value used in WEP that changes each time a packet is encrypted.
(Multiple Choice)
4.9/5
(31)
If the EAP authentication is successful, a success packet is sent to the ____________________.
(Short Answer)
4.8/5
(31)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)