Exam 11: Managing a Wireless LAN
Exam 1: The World of Wireless41 Questions
Exam 2: Wireless Local Area Networks41 Questions
Exam 3: Radio Frequency Fundamentals42 Questions
Exam 4: Antennas41 Questions
Exam 5: Physical Layer Standards42 Questions
Exam 6: Medium Access Control Layer Standards42 Questions
Exam 7: WLAN Management and Architectures41 Questions
Exam 8: Conducting a Site Survey41 Questions
Exam 9: Wireless LAN Security Vulnerabilities40 Questions
Exam 10: Implementing Wireless LAN Security40 Questions
Exam 11: Managing a Wireless LAN41 Questions
Exam 12: Wireless Network Troubleshooting and Optimization41 Questions
Exam 13: Other Wireless Networks42 Questions
Select questions type
____________________ is software that is embedded into hardware to control the device.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Firmware
One of the goals of a security policy is to implement control.
Free
(True/False)
4.7/5
(32)
Correct Answer:
True
List the five assessments involved in creating a vulnerability assessment.
Free
(Essay)
4.9/5
(32)
Correct Answer:
Asset identification
Threat evaluation
Vulnerability appraisal
Risk assessment
Risk mitigation
Which of the following are RF site tuning settings? (Choose all that apply.)
(Multiple Choice)
4.9/5
(33)
Successful social engineering attacks rely on the weakness of people.
(True/False)
4.8/5
(32)
Which type of policy defines the actions users may perform while accessing the network?
(Multiple Choice)
5.0/5
(39)
Although data from the access point and devices can be beneficial,there are drawbacks to relying solely on these sources of information.What are the drawbacks?
(Essay)
4.8/5
(35)
Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information?
(Multiple Choice)
4.8/5
(32)
Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
(True/False)
4.8/5
(34)
As an insurance company,the customer data that you store on your servers should be considered which of the following?
(Multiple Choice)
4.9/5
(27)
Which of the following are NOT among the several defenses against attacks?
(Multiple Choice)
4.8/5
(35)
Many enterprise-level access points provide utilities that offer three types of information.What are they?
(Essay)
4.8/5
(32)
A threat agent is software installed on a computer that monitors for potential threats to the computer.
(True/False)
4.7/5
(33)
The point of RF site tuning is to locate where APs should be mounted.
(True/False)
4.7/5
(29)
Which of the following types of information can you expect from an enterprise-level AP?
(Multiple Choice)
4.8/5
(30)
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
(Short Answer)
4.7/5
(35)
Showing 1 - 20 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)