Exam 10: Implementing Wireless LAN Security
Exam 1: The World of Wireless41 Questions
Exam 2: Wireless Local Area Networks41 Questions
Exam 3: Radio Frequency Fundamentals42 Questions
Exam 4: Antennas41 Questions
Exam 5: Physical Layer Standards42 Questions
Exam 6: Medium Access Control Layer Standards42 Questions
Exam 7: WLAN Management and Architectures41 Questions
Exam 8: Conducting a Site Survey41 Questions
Exam 9: Wireless LAN Security Vulnerabilities40 Questions
Exam 10: Implementing Wireless LAN Security40 Questions
Exam 11: Managing a Wireless LAN41 Questions
Exam 12: Wireless Network Troubleshooting and Optimization41 Questions
Exam 13: Other Wireless Networks42 Questions
Select questions type
Dictionary attacks are used to attack what aspect of WEP2?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
Amongst the most common transport encryption algorithms,used to securely transmit documents over the Internet is which of the following?
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
B
Due to the enhancements in WEP2,it was widely implemented and remains a popular security mechanism today.
Free
(True/False)
4.9/5
(38)
Correct Answer:
False
WPA ____________________ was designed for individuals or small office home office (SOHO)settings of generally 10 or fewer employees.
(Short Answer)
4.9/5
(32)
Signature-based monitoring can be described as which of the following?
(Multiple Choice)
4.9/5
(38)
It is important that the entire RF spectrum be scanned for potential attacks,which means the channels on which frequencies should be scanned?
(Multiple Choice)
4.9/5
(41)
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
(True/False)
4.9/5
(29)
What are the three major components in TKIP that address security vulnerabilities? (Choose three.)
(Multiple Choice)
4.8/5
(30)
Used in WEP2,____________________ was developed by the Massachusetts Institute of Technology (MIT)and used to verify the identity of network users.
(Short Answer)
4.8/5
(33)
A ____ VPN is a user-to-LAN connection used by remote users.
(Multiple Choice)
4.8/5
(32)
Which was developed to help users who have little or no knowledge of security quickly and easily implement WPA2 on their WLANs?
(Multiple Choice)
4.9/5
(35)
Which of the following are true about wireless security systems? (Choose all that apply.)
(Multiple Choice)
4.7/5
(38)
What authentication system did the proposed WEP2 standard use?
(Multiple Choice)
4.7/5
(40)
Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply)
(Multiple Choice)
4.8/5
(29)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(36)
What does WPA include that is designed to prevent an attacker from conducting man-in-the-middle attacks?
(Multiple Choice)
5.0/5
(37)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)