100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Chapter 9 - Wireless Network Security Questions and Answers 2023

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
24-07-2023
Written in
2022/2023

Chapter 9 - Wireless Network Security Questions and Answers 2023 Bluetooth is an example of what type of technology below? Small Area Network Private Area Network Personal Area Network Limited Area Network Personal Area Network What is the maximum range of most Bluetooth devices? 10 ft 18 meters 15 meters 33 ft 33 ft The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications? Bluetooth v2.1 Bluetooth v1.2 Bluetooth v 1.0 Bluetooth v 1.1 Bluetooth v1.2 Slave devices that are connected to a piconet and are sending transmissions are known as what? Active slave Passive slaves Hybrid drones Neutral drones Active slave Piconets in which connections exist between different piconets are known as a: broadnet honeynet boundnet scatternet scatternet What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? Bluesnarfing Bluejacking Bluecracking Bluetalking Bluejacking A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? Bluejacking Bluecracking Bluesnarfing Bluetalking Bluesnarfing What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? Access Point Endpoint WMM Ad-hoc peer Access Point An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? random sanctioned rogue legitimate rogue What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? active twin authorized twin internal replica evil twin evil twin What is the maximum number of characters that can exist within an SSID name? 10 12 26 32 32 The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length? 24 bits 32 bits 48 bits 64 bits 48 bits Which encryption protocol below is used in the WPA2 standard? AES-CCMP AES-CTR AES-TKIP AES-SCMP AES-CCMP Which of the following choices is not one of the four types of packets used by EAP? Request Response Success Error Error Which option below is responsible for the issuing of EAP request packets? supplicant authenticator authentication server proxy authenticator Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: EAP-MSCHAPv2 EAP-AKA EAP-FAST EAP-SIM EAP-FAST What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? LEAP TKIP EAP PEAP LEAP Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? TKIP LEAP PEAP ICMP PEAP

Show more Read less
Institution
SCMP
Course
SCMP








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SCMP
Course
SCMP

Document information

Uploaded on
July 24, 2023
Number of pages
4
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
julianah420 Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
679
Member since
3 year
Number of followers
328
Documents
34861
Last sold
1 week ago
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.2

154 reviews

5
102
4
21
3
10
2
5
1
16

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions