Filters
Question type

Study Flashcards

How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?


A) Gateway access point
B) Captive portal access point
C) Wireless device probe
D) AUP Enforcement access point

Correct Answer

verifed

verified

What is the role of the IEEE in computer networking and wireless communications?

Correct Answer

verifed

verified

The Institute of Electrical and Electron...

View Answer

____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.

Correct Answer

verifed

verified

On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.

Correct Answer

verifed

verified

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?


A) random
B) sanctioned
C) rogue
D) legitimate

Correct Answer

verifed

verified

The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?


A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1

Correct Answer

verifed

verified

Which option below is responsible for the issuing of EAP request packets?


A) supplicant
B) authenticator
C) authentication server
D) proxy

Correct Answer

verifed

verified

Explain what war driving is.

Correct Answer

verifed

verified

Because there is no mechanism to strictl...

View Answer

What is the Message Integrity Check (MIC) within WPA used for?​

Correct Answer

verifed

verified

The Message Integrity Check (M...

View Answer

Matching -​Searching for wireless signals from an automobile or on foot using a portable computing device


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

Correct Answer

verifed

verified

Matching -​An optional means of configuring security on wireless area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs.


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

Correct Answer

verifed

verified

Matching -A 24-bit value used in WEP that changes each time a packet is encrypted.​


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

Correct Answer

verifed

verified

Matching -​Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.


A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)

Correct Answer

verifed

verified

When using AES-CCMP, the AES-256 bit key requires how many rounds?​


A) ​4
B) ​10
C) ​13
D) ​15

Correct Answer

verifed

verified

Bluetooth is an example of what type of technology below?


A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network

Correct Answer

verifed

verified

List and describe the major parts of an access point.

Correct Answer

verifed

verified

An access point (AP) consists of three m...

View Answer

Slave devices that are connected to a piconet and are sending transmissions are known as what?


A) Active slave
B) Passive slaves
C) Hybrid drones
D) Neutral drones

Correct Answer

verifed

verified

If the EAP authentication is successful, a success packet is sent to the ____________________.

Correct Answer

verifed

verified

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?


A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking

Correct Answer

verifed

verified

Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer