Chapter 9 - Wireless Network Security

9 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
Bluetooth is an example of what type of technology below? Small Area Network Private Area Network Personal Area Network Limited Area Network
answer
Personal Area Network
question
What is the maximum range of most Bluetooth devices? 10 ft 18 meters 15 meters 33 ft
answer
33 ft
question
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications? Bluetooth v2.1 Bluetooth v1.2 Bluetooth v 1.0 Bluetooth v 1.1
answer
Bluetooth v1.2
question
Slave devices that are connected to a piconet and are sending transmissions are known as what? Active slave Passive slaves Hybrid drones Neutral drones
answer
Active slave
question
Piconets in which connections exist between different piconets are known as a: broadnet honeynet boundnet scatternet
answer
scatternet
question
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices? Bluesnarfing Bluejacking Bluecracking Bluetalking
answer
Bluejacking
question
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as? Bluejacking Bluecracking Bluesnarfing Bluetalking
answer
Bluesnarfing
question
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? Access Point Endpoint WMM Ad-hoc peer
answer
Access Point
question
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? random sanctioned rogue legitimate
answer
rogue
question
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? active twin authorized twin internal replica evil twin
answer
evil twin
question
What is the maximum number of characters that can exist within an SSID name? 10 12 26 32
answer
32
question
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length? 24 bits 32 bits 48 bits 64 bits
answer
48 bits
question
Which encryption protocol below is used in the WPA2 standard? AES-CCMP AES-CTR AES-TKIP AES-SCMP
answer
AES-CCMP
question
Which of the following choices is not one of the four types of packets used by EAP? Request Response Success Error
answer
Error
question
Which option below is responsible for the issuing of EAP request packets? supplicant authenticator authentication server proxy
answer
authenticator
question
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS: EAP-MSCHAPv2 EAP-AKA EAP-FAST EAP-SIM
answer
EAP-FAST
question
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software? LEAP TKIP EAP PEAP
answer
LEAP
question
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? TKIP LEAP PEAP ICMP
answer
PEAP
question
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials? Gateway access point Captive portal access point Wireless device probe AUP Enforcement access point
answer
Captive portal access point
question
When using AES-CCMP, the AES-256 bit key requires how many rounds? 4 10 13 15
answer
13