Filters
Question type

Study Flashcards

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?


A) random
B) sanctioned
C) rogue
D) legitimate

Correct Answer

verifed

verified

C

Which encryption protocol below is used in the WPA2 standard?


A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP

Correct Answer

verifed

verified

In a bluesnooping attack,the attacker copies emails,calendars,contact lists,cell phone pictures,or videos by connecting to the Bluetooth device without the owner's knowledge or permission.

Correct Answer

verifed

verified

False

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?


A) active twin
B) authorized twin
C) internal replica
D) evil twin

Correct Answer

verifed

verified

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?


A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking

Correct Answer

verifed

verified

Describe a piconet.

Correct Answer

verifed

verified

When two Bluetooth devices come within r...

View Answer

Select the EAP protocol that uses digital certificates for authentication?


A) EAP-MSCHAPv3
B) EAP-AKA
C) EAP-FAST
D) EAP-TLS

Correct Answer

verifed

verified

RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking.

Correct Answer

verifed

verified

In ad hoc mode,devices can only communicate between themselves and cannot connect to another network.

Correct Answer

verifed

verified

How does the WPA Temporal Key Integrity Protocol encryption technology operate?

Correct Answer

verifed

verified

TKIP functions as a "wrapper" around WEP...

View Answer

The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length?


A) 24 bits
B) 32 bits
C) 48 bits
D) 64 bits

Correct Answer

verifed

verified

Which direction do access point antennas radiate their signals and where should they be located?


A) two direction and centrally located
B) four directions and asymmetrically located
C) all directions and asymmetrically located
D) all directions and centrally located

Correct Answer

verifed

verified

List and describe the major parts of an access point.

Correct Answer

verifed

verified

An access point (AP)consists of three ma...

View Answer

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.


A) EAP-MSCHAPv2
B) EAP-AKA
C) EAP-FAST
D) EAP-TLS

Correct Answer

verifed

verified

C

What device acts like a wireless base station in a network,acting as a bridge between wireless and wired networks?


A) access Point
B) endpoint
C) WMM
D) ad-hoc peer

Correct Answer

verifed

verified

For IEEE WLANs,the maximum transmit power is 200 milliwatts (mW).

Correct Answer

verifed

verified

Explain why it is important to be able to control the power level at which the WLAN transmits.

Correct Answer

verifed

verified

Another security feature on some APs is ...

View Answer

What is the most common type of wireless access control?

Correct Answer

verifed

verified

Media Access Control...

View Answer

Which of the following self-contained APs are autonomous,or independent,because they are separate from other network devices and even other autonomous APs?


A) fat APs
B) single APs
C) thin APs
D) super APs

Correct Answer

verifed

verified

What are the four types of packets used by EAP?

Correct Answer

verifed

verified

EAP uses four types ...

View Answer

Showing 1 - 20 of 50

Related Exams

Show Answer