2024/2025
In 802.11i, protection is provided between the client and the ________.
access point
The protection of communication between a wireless client and the access point
is ________.
link security
The Wi-Fi Alliance calls 802.11i ________.
WPA2
After authentication in 80.11i PSK mode, a wireless client communicates with the
access point via a(n) ________ key.
pairwise session
In 802.11i PSK mode, the pass phrase should be at least ________ characters
long.
20
If a firm has many access points, it should use ________ initial authentication
mode in 802.11i.
802.1X
In 802.1x initial authentication mode, the authenticator is the ________.
wireless access point
A ________ is an unauthorized internal access point.
rogue
A rogue access point is usually created by ________.
an employee
An evil twin access point is usually ________.
a laptop computer
If a company uses 802.11i for its core security protocol, an evil twin access point
will set up ________ 802.11i connection(s).
two
In VPNs designed to frustrate evil twin attacks, the shared secret between the
client and the server is ________.
not transmitted
, A VPN provides ________.
end-to-end security
A group of devices on a desk that communicate wirelessly is called a ________.
PAN
Bluetooth ________ is likely to be used most of the time in IoT transmission.
LE
Bluetooth Low Energy ________.
conserves battery power
Bluetooth LE normally uses ________ for power.
a coin battery
Bluetooth uses ________ operation.
one-to-one
For a game joystick, you would use the ________ Bluetooth profile.
human interface device
In Bluetooth LE, ________ notify other Bluetooth devices that it is available.
advertisements
In Bluetooth LE, ________ provide information.
beacons
A Bluetooth profile for sending a command from a wireless light switch to a lamp
is probably a ________ profile.
Bluetooth LE
NFC transmission standards have been set for ________.
its service band
Wi-Fi direct ________ uses access points.
never
Zigbee is designed to be used in a(n) ________ network.
ad hoc
In Zigbee, ad hoc networking's mesh is operated by ________.
Zigbee Routers
________ can operate in the 2.4 service band.
Zigbee
In IoT device transmission, published distance limits are relevant for ________.
legitimate users
The state of security in IoT transmission standards is ________.
mixed
Ethernet standards are set at the ________.
physical layer
TCP/IP standards are set at the ________.
transport layer
UDP is a standard for ________.
packet delivery