Exam 9: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching -​An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.

(Multiple Choice)
5.0/5
(37)

Which option below is responsible for the issuing of EAP request packets?

(Multiple Choice)
4.7/5
(41)

Explain what war driving is.

(Essay)
4.9/5
(38)

The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?

(Multiple Choice)
4.8/5
(33)

List and describe the major parts of an access point.

(Essay)
4.8/5
(28)

On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.

(Short Answer)
4.8/5
(34)

How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?

(Multiple Choice)
4.9/5
(36)

Matching -​Searching for wireless signals from an automobile or on foot using a portable computing device

(Multiple Choice)
4.8/5
(38)

When using AES-CCMP, the AES-256 bit key requires how many rounds?​

(Multiple Choice)
4.9/5
(36)

What is the role of the IEEE in computer networking and wireless communications?

(Essay)
4.8/5
(36)

Slave devices that are connected to a piconet and are sending transmissions are known as what?

(Multiple Choice)
5.0/5
(36)

Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.

(True/False)
4.9/5
(43)

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

(Multiple Choice)
4.9/5
(38)

Bluetooth is an example of what type of technology below?

(Multiple Choice)
4.9/5
(38)

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

(Multiple Choice)
4.8/5
(27)

What is the Message Integrity Check (MIC) within WPA used for?​

(Essay)
4.9/5
(37)

____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.

(Short Answer)
4.8/5
(27)

Matching -​Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.

(Multiple Choice)
4.8/5
(25)

Matching -A 24-bit value used in WEP that changes each time a packet is encrypted.​

(Multiple Choice)
4.9/5
(31)

If the EAP authentication is successful, a success packet is sent to the ____________________.

(Short Answer)
4.8/5
(31)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)