Take Another Quiz

CHAP 8

15 Questions
Chap 8

CHAPTER 8 QUIZ

Questions and Answers
  • 1. 
    Bluetooth devices are not backward compatible with previous versions
    • A. 

      True

    • B. 

      False

  • 2. 
    Is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
    • A. 

      Bluecracking

    • B. 

      Bluetalking

    • C. 

      Bluejacking

    • D. 

      Bluesnarfing

  • 3. 
    ____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
    • A. 

      Twin

    • B. 

      Rogue

    • C. 

      Sanctioned

    • D. 

      Legitimate

  • 4. 
    Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
    • A. 

      True

    • B. 

      False

  • 5. 
    Bluetooth is a ____ technology designed for data communication over short distances.
    • A. 

      Small Area Network

    • B. 

      Limited Area Network

    • C. 

      Private Area Network

    • D. 

      Personal Area Network

  • 6. 
    A(n) ____ acts as the “base station” for the wireless network.
    • A. 

      WMM

    • B. 

      Endpoint

    • C. 

      AP

    • D. 

      Ad-hoc peer

  • 7. 
     is the encryption protocol standard for WPA2.
    • A. 

      AES-SCMP

    • B. 

      AES-TKIP

    • C. 

      AES-CCMP

    • D. 

      AES-CTR

  • 8. 
    Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
    • A. 

      False

    • B. 

      True

  • 9. 
    Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
    • A. 

      Hybrid

    • B. 

      Passive

    • C. 

      Active

    • D. 

      Neutral

  • 10. 
    The SSID can generally be any alphanumeric string from 2 to ___ characters.
    • A. 

      28

    • B. 

      32

    • C. 

      34

    • D. 

      23

  • 11. 
    Is an attack that sends unsolicited messages to Bluetooth-enabled devices.
    • A. 

      Bluejacking

    • B. 

      Bluecracking

    • C. 

      Bluetalking

    • D. 

      Bluesnarfing

  • 12. 
    Requires mutual authentication used for WLAN encryption using Cisco client software.
    • A. 

      PEAP

    • B. 

      TKIP

    • C. 

      EAP

    • D. 

      LEAP

  • 13. 
    Allow a single access point to service different types of users.
    • A. 

      Wireless VPNs

    • B. 

      Wireless encryption standards

    • C. 

      Wireless multimedia protocols

    • D. 

      Wireless VLANs

  • 14. 
    Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
    • A. 

      False

    • B. 

      True

  • 15. 
    The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
    • A. 

      Bluetooth v1.2

    • B. 

      Bluetooth v 1.0

    • C. 

      Bluetooth v 1.1

    • D. 

      Bluetooth v2.1