Chap 8

15 Questions  I  By Dukeman
CHAPTER 8 QUIZ.?

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Bluetooth devices are not backward compatible with previous versions
A.
B.
2.  Is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
A.
B.
C.
D.
3.  ____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
A.
B.
C.
D.
4.  Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
A.
B.
5.  Bluetooth is a ____ technology designed for data communication over short distances.
A.
B.
C.
D.
6.  A(n) ____ acts as the “base station” for the wireless network.
A.
B.
C.
D.
7.   is the encryption protocol standard for WPA2.
A.
B.
C.
D.
8.  Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
A.
B.
9.  Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
A.
B.
C.
D.
10.  The SSID can generally be any alphanumeric string from 2 to ___ characters.
A.
B.
C.
D.
11.  Is an attack that sends unsolicited messages to Bluetooth-enabled devices.
A.
B.
C.
D.
12.  Requires mutual authentication used for WLAN encryption using Cisco client software.
A.
B.
C.
D.
13.  Allow a single access point to service different types of users.
A.
B.
C.
D.
14.  Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
A.
B.
15.  The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz