Exam 11: Managing a Wireless LAN

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is software that is embedded into hardware to control the device.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

Firmware

One of the goals of a security policy is to implement control.

Free
(True/False)
4.7/5
(32)
Correct Answer:
Verified

True

List the five assessments involved in creating a vulnerability assessment.

Free
(Essay)
4.9/5
(32)
Correct Answer:
Verified

Asset identification
Threat evaluation
Vulnerability appraisal
Risk assessment
Risk mitigation

Which of the following are RF site tuning settings? (Choose all that apply.)

(Multiple Choice)
4.9/5
(33)

Successful social engineering attacks rely on the weakness of people.

(True/False)
4.8/5
(32)

What is a difference between RMON and SNMP?

(Multiple Choice)
4.9/5
(28)

Which type of policy defines the actions users may perform while accessing the network?

(Multiple Choice)
5.0/5
(39)

Although data from the access point and devices can be beneficial,there are drawbacks to relying solely on these sources of information.What are the drawbacks?

(Essay)
4.8/5
(35)

Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information?

(Multiple Choice)
4.8/5
(32)

Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.

(True/False)
4.8/5
(34)

As an insurance company,the customer data that you store on your servers should be considered which of the following?

(Multiple Choice)
4.9/5
(27)

Which of the following are NOT among the several defenses against attacks?

(Multiple Choice)
4.8/5
(35)

What are the two aspects of procedural security defenses?

(Essay)
4.9/5
(32)

Many enterprise-level access points provide utilities that offer three types of information.What are they?

(Essay)
4.8/5
(32)

A threat agent is software installed on a computer that monitors for potential threats to the computer.

(True/False)
4.7/5
(33)

Which of the following is true of security policies?

(Multiple Choice)
4.8/5
(28)

The point of RF site tuning is to locate where APs should be mounted.

(True/False)
4.7/5
(29)

Which of the following types of information can you expect from an enterprise-level AP?

(Multiple Choice)
4.8/5
(30)

____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.

(Short Answer)
4.7/5
(35)

Which best describes kinesthetic learners?

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)