Filters
Question type

Study Flashcards

What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?


A) LEAP
B) TKIP
C) EAP
D) PEAP

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Piconets in which connections exist between different piconets are known as a:


A) broadnet
B) honeynet
C) boundnet
D) scatternet

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Matching -An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.​


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

K) A) and F)
L) B) and H)

Correct Answer

verifed

verified

The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?


A) 24 bits
B) 32 bits
C) 48 bits
D) 64 bits

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.

A) True
B) False

Correct Answer

verifed

verified

Discuss the different types of interference one might encounter using wireless devices.

Correct Answer

verifed

verified

Because wireless devices operate using R...

View Answer

What is the maximum range of most Bluetooth devices?


A) 10 ft
B) 18 meters
C) 15 meters
D) 33 ft

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?


A) ​Access Point
B) ​Endpoint
C) ​WMM
D) ​Ad-hoc peer

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Matching -​An attack that sends unsolicited messages to Bluetooth-enabled devices


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

K) A) and F)
L) A) and J)

Correct Answer

verifed

verified

When a wireless device looks for beacon frames it is known as ____________________. ​

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer