Multiple Choice
Matching
-The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)
Correct Answer:

Verified
Correct Answer:
Verified
Q10: What is the maximum number of characters
Q11: A Bluetooth attack in which the attacker
Q12: Identify and describe two types of wireless
Q13: Select the EAP protocol supported by WPA2
Q13: Explain why it is important to be
Q14: Bluetooth devices are not backward compatible with
Q18: A _ is an in-depth examination and
Q20: An evil twin AP is an AP
Q24: Which of the following choices is not
Q41: Which EAP protocol creates an encrypted channel