Multiple Choice
Which of the following are true about wireless security systems? (Choose all that apply.)
A) a method used by WIDS is anomaly-based monitoring
B) WIPS can prevent an attack while WIDS cannot
C) WIPS is dependent on signatures
D) passive WIDS can configure the firewall if an attack is detected
Correct Answer:

Verified
Correct Answer:
Verified
Q8: What are the three major components in
Q9: Which encryption protocol is used for 802.11i/WPA2?<br>A)
Q10: Used in WEP2,_ was developed by the
Q11: A _ VPN is a user-to-LAN connection
Q12: Which was developed to help users who
Q14: What authentication system did the proposed WEP2
Q15: Describe a block cipher.
Q16: Briefly describe RADIUS and mention a strength
Q17: Which WEP weaknesses were identified by universities
Q18: Describe a dictionary attack.