Bluetooth is an example of what type of technology below? Small Area Network |
Personal Area Network |
What is the maximum range of most Bluetooth devices? 10 ft |
33 ft |
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications? Bluetooth v2.1 |
Bluetooth v1.2 |
Slave devices that are connected to a piconet and are sending transmissions are known as what? Active slave |
Active slave |
Piconets in which connections exist between different piconets are known as a: broadnet |
scatternet |
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? Bluesnarfing |
Bluejacking |
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? Bluejacking |
Bluesnarfing |
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? Access Point |
Access Point |
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? random |
rogue |
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? active twin |
evil twin |
What is the maximum number of characters that can exist within an SSID name? 10 |
32 |
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length? 24 bits |
48 bits |
Which encryption protocol below is used in the WPA2 standard? AES-CCMP |
AES-CCMP |
Which of the following choices is not one of the four types of packets used by EAP? Request |
Error |
Which option below is responsible for the issuing of EAP request packets? supplicant |
authenticator |
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: EAP-MSCHAPv2 |
EAP-FAST |
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? LEAP |
LEAP |
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? TKIP |
PEAP |
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? Gateway access point |
Captive portal access point |
When using AES-CCMP, the AES-256 bit key requires how many rounds? 4 |
13 |
Chapter 9 – Wireless Network Security
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price