The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications? |
Bluetooth v1.2 |
Piconets in which connections exist between different piconets are known as a: |
scatternet |
Which option below is responsible for the issuing of EAP request packets? |
authenticator |
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP. |
False |
Which encryption protocol below is used in the WPA2 standard? |
AES-CCMP |
Bluetooth is an example of what type of technology below? |
Personal Area Network |
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? |
PEAP |
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? |
Captive portal access point |
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: |
EAP-FAST |
When using AES-CCMP, the AES-256 bit key requires how many rounds? |
13 |
APs use antennas that radiate a signal in all directions. |
True |
What is the maximum range of most Bluetooth devices? |
33 ft |
Which of the following choices is not one of the four types of packets used by EAP? |
Error |
Slave devices that are connected to a piconet and are sending transmissions are known as what? |
Active slave |
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? |
rogue |
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? |
Bluesnarfing |
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? |
evil twin |
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV. |
True |
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length? |
48 bits |
Bluetooth devices are not backward compatible with previous versions. |
False |
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? |
Access Point |
What is the maximum number of characters that can exist within an SSID name? |
32 |
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? |
LEAP |
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? |
Bluejacking |
An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP, with the intent to redirect client devices. |
False |
Week 9
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price