Multiple Choice
Matching
-An attack that sends unsolicited messages to Bluetooth-enabled devices
A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)
Correct Answer:

Verified
Correct Answer:
Verified
Q38: Matching<br>-Intentionally flooding the radio frequency (RF) spectrum
Q39: Matching<br>-A 24-bit value used in WEP that
Q40: If the EAP authentication is successful, a
Q41: Piconets in which connections exist between different
Q42: What is the maximum range of most
Q44: What device acts like a wireless base
Q45: When a wireless device looks for beacon
Q46: Because of the weaknesses of WEP, it
Q47: What proprietary EAP method developed by Cisco
Q48: The Temporal Key Integrity Protocol (TKIP) encryption