Exam 9: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Piconets in which connections exist between different piconets are known as a:

(Multiple Choice)
4.9/5
(34)

What is the maximum range of most Bluetooth devices?

(Multiple Choice)
4.8/5
(37)

Matching -​An attack that sends unsolicited messages to Bluetooth-enabled devices

(Multiple Choice)
4.8/5
(25)

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?

(Multiple Choice)
4.7/5
(40)

When a wireless device looks for beacon frames it is known as ____________________. ​

(Short Answer)
4.9/5
(40)

Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.

(True/False)
4.9/5
(41)

What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?

(Multiple Choice)
4.8/5
(36)

The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?

(Multiple Choice)
4.8/5
(30)

Matching -An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.​

(Multiple Choice)
5.0/5
(44)

Discuss the different types of interference one might encounter using wireless devices.

(Essay)
4.7/5
(31)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)