Week 9

Your page rank:

Total word count: 449
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?

Bluetooth v1.2

Piconets in which connections exist between different piconets are known as a:

scatternet

Which option below is responsible for the issuing of EAP request packets?

authenticator

Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.

False

Which encryption protocol below is used in the WPA2 standard?

AES-CCMP

Bluetooth is an example of what type of technology below?

Personal Area Network

Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?

PEAP

How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?

Captive portal access point

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:

EAP-FAST

When using AES-CCMP, the AES-256 bit key requires how many rounds?​

13

APs use antennas that radiate a signal in all directions.

True

What is the maximum range of most Bluetooth devices?

33 ft

Which of the following choices is not one of the four types of packets used by EAP?

Error

Slave devices that are connected to a piconet and are sending transmissions are known as what?

Active slave

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

rogue

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?

Bluesnarfing

What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

evil twin

Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.

True

The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?

48 bits

Bluetooth devices are not backward compatible with previous versions.

False

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?

Access Point

What is the maximum number of characters that can exist within an SSID name?

32

What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?

LEAP

What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

Bluejacking

An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP​, with the intent to redirect client devices.

False

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending