Multiple Choice
In an) __________ situation,a wireless device is configured to appear to be a legitimate access point,enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.
A) malicious association
B) identiy theft
C) network injection
D) ad hoc network
Correct Answer:

Verified
Correct Answer:
Verified
Q4: Wireless networks, and the wireless devices that
Q9: The master session key is also known
Q12: The layer of the IEEE 802 reference
Q13: The _ is used to ensure the
Q15: The PMK is used to generate the
Q17: A _ attack occurs when an attacker
Q17: The function of the _ is to
Q18: To certify interoperability for 802.11b products an
Q19: The first 802.11 standard to gain broad
Q25: You should allow only specific computers to