Exam 10: Implementing Wireless LAN Security
Exam 1: The World of Wireless41 Questions
Exam 2: Wireless Local Area Networks41 Questions
Exam 3: Radio Frequency Fundamentals42 Questions
Exam 4: Antennas41 Questions
Exam 5: Physical Layer Standards42 Questions
Exam 6: Medium Access Control Layer Standards42 Questions
Exam 7: WLAN Management and Architectures41 Questions
Exam 8: Conducting a Site Survey41 Questions
Exam 9: Wireless LAN Security Vulnerabilities40 Questions
Exam 10: Implementing Wireless LAN Security40 Questions
Exam 11: Managing a Wireless LAN41 Questions
Exam 12: Wireless Network Troubleshooting and Optimization41 Questions
Exam 13: Other Wireless Networks42 Questions
Select questions type
________________ WEP solves the weak IV problem by rotating the keys frequently and uses different keys for different types of traffic.
(Short Answer)
4.9/5
(42)
Which type of WIDS/WIPS sensor uses dedicated sensors for scanning the RF for attacks?
(Multiple Choice)
4.9/5
(33)
Authentication for WPA Personal is accomplished using a ____________ key.
(Short Answer)
4.9/5
(33)
Which of the following is NOT a typical AP status tagged by a WIDS/WIPS system?
(Multiple Choice)
4.9/5
(33)
Temporal Key Integrity Protocol (TKIP)has three major components to address vulnerabilities.List and describe them.
(Essay)
4.9/5
(37)
A virtual private network (VPN)uses a public,unsecured network as if it were a private,secured network.
(True/False)
4.8/5
(34)
Which of the following are TKIP enhancement areas? (Choose all that apply.)
(Multiple Choice)
4.9/5
(37)
A WIDS/WIPS that uses a(n)_________________ sensor uses existing APs to monitor the RF.
(Short Answer)
4.9/5
(32)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)