The current Bluetooth version is Bluetooth 6. |
B. False |
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission. |
B. False |
Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity. |
True |
RFID is commonly used to transmit information between networked computers. |
False |
In ad hoc mode, devices can only communicate between themselves and cannot connect to another network. |
True |
RF signals can be picked up from an open or mis-configured AP. |
True |
RF signal "noise" that creates interference and prevents communications from occurring is called signal blocking. |
False |
The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured. |
False |
Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. |
True |
For IEEE WLANs, the maximum transmit power is 200 milliwatts (mW). |
True |
Bluetooth is an example of what type of technology below? |
C. Personal Area Network |
What is the maximum range of most Bluetooth 5 devices? |
D. 800 ft |
What type of radio frequency transmissions are used by Bluetooth devices? |
C. Short-range radio |
Slave devices that are connected to a piconet and are sending transmissions are known as what? |
A. active slave |
Piconets in which connections exist between different piconets are known as which of the following terms? |
D. scatternet |
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? |
B. Bluejacking |
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms? |
C. Bluesnarfing |
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? |
A. Access point |
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? |
C. Rogue |
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? |
D. Evil Twin |
What is the maximum number of characters that can exist within a SSID name? |
D. 32 |
The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length? |
D. 64 bits |
Which encryption protocol below is used in the WPA2 standard? |
A. AES-CCMP |
Which of the following choices is not one of the four types of packets used by EAP? |
D. Error |
Which option below is responsible for the issuing of EAP request packets? |
B. Authenticator |
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS. |
C. EAP-FAST |
Select the EAP protocol that uses digital certificates for authentication? |
EAP-TLS |
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? |
C. PEAP |
What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security? |
A. captive portal AP |
When using AES-CCMP, the AES-256 bit key requires how many rounds? |
C. 13 |
Where does the supplicant send identity information? |
C. Authenticator |
Select the device that is designed to exclusively monitor the RF frequency for network transmissions? |
C. WAP |
What encryption protocol is used for WPA2? |
C. CCMP |
What is the maximum transmission power for IEEE WLANs? |
B. 200 milliwatts (mW) |
What specific feature on an AP controls how much of the spectrum is available to transfer data? |
A. Channel Width |
Which direction do access point antennas radiate their signals and where should they be located? |
D. all directions and centrally located |
What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points? |
B. site |
Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices and even other autonomous APs? |
A. fat APs |
Which of the following is the most secure form of IEEE 802.1x authentication |
D. Certificate-based authentication |
Authentication for WPA Personal is accomplished by using what type of key? |
B. PSK |
Security – Chapter 8
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price