Exam 11: Managing a Wireless LAN

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Impersonation falls into which category of attack?

(Multiple Choice)
4.8/5
(34)

Which form of social engineering often takes place as an e-mail message falsely claiming to be from a legitimate sender in an attempt to get private information?

(Multiple Choice)
5.0/5
(40)

Provide a thorough definition of security policy.

(Essay)
4.8/5
(32)

List and describe three RF site tuning settings.

(Essay)
4.9/5
(38)

What is the final phase of developing a security policy?

(Essay)
4.8/5
(39)

What is RMON?

(Essay)
4.9/5
(33)

What is the first phase of the development of a security policy likely to involve?

(Multiple Choice)
4.9/5
(40)

Which of the following is NOT a component of using SNMP for network monitoring?

(Multiple Choice)
4.9/5
(33)

List three types of security policy.

(Essay)
4.9/5
(46)

What does an updated enterprise-level AP use to distribute the latest update to other APs on the WLAN?

(Multiple Choice)
4.9/5
(25)
Match each term with the correct statement below.
the task of identifying and categorizing assets
exploiting
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
risk
a policy that defines the actions users may perform while accessing systems and networking equipment
asset management
Correct Answer:
Verified
Premises:
Responses:
the task of identifying and categorizing assets
exploiting
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
risk
a policy that defines the actions users may perform while accessing systems and networking equipment
asset management
taking advantage of a vulnerability
RF site tuning
a type of action that has the potential to cause harm
event log
the likelihood that a threat agent will exploit a vulnerability
acceptable use policy
a flaw or weakness that allows a threat agent to bypass security
MIB
a record of events
impact analysis
adjustments to a WLAN performed as part of routine maintenance
threat
the storage area in which SNMP software agents store their data
vulnerability
(Matching)
4.8/5
(47)

Describe social engineering.

(Essay)
4.7/5
(38)

What are frequently the weakest link in information security?

(Multiple Choice)
5.0/5
(37)

Which of the following is NOT an option when dealing with risk?

(Multiple Choice)
4.8/5
(40)

A ___________________ assessment attempts to identify what needs to be protected,what the pressures are against it,and how susceptible the current protection is.

(Short Answer)
5.0/5
(31)

____________________ is a nonvolatile storage chip that uses byte-wise writable memories.

(Essay)
4.9/5
(37)

In order to use SNMP,a software ____________________ is loaded onto each network device that will be managed using SNMP.

(Short Answer)
4.8/5
(32)

Which of the following is NOT typically included in an impact analysis?

(Multiple Choice)
4.9/5
(35)

Which of the following is a flaw or weakness that allows an attacker to bypass security?

(Multiple Choice)
4.8/5
(44)

What is the most common method for updating an AP's capabilities?

(Multiple Choice)
4.7/5
(41)
Showing 21 - 40 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)