How To Use Bluetooth Device?

26 Questions | Total Attempts: 49

SettingsSettingsSettings
Please wait...
Device Quizzes & Trivia

Do you consider yourself a tech savvy individual who is always up to date with the different technological advancements today? Take this quiz to figure out if you know how to use a Bluetooth device.


Questions and Answers
  • 1. 
    Bluetooth devices are not backward compatible with previous versions.
    • A. 

      True

    • B. 

      False

  • 2. 
    Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
    • A. 

      True

    • B. 

      False

  • 3. 
    Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
    • A. 

      True

    • B. 

      False

  • 4. 
    Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
    • A. 

      True

    • B. 

      False

  • 5. 
    APs use antennas that radiate a signal in all directions.
    • A. 

      True

    • B. 

      False

  • 6. 
    Bluetooth is a ____ technology designed for data communication over short distances.
    • A. 

      Small Area Network

    • B. 

      Private Area Network

    • C. 

      Personal Area Network

    • D. 

      Limited Area Network

  • 7. 
    Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
    • A. 

      10

    • B. 

      18

    • C. 

      15

    • D. 

      33

  • 8. 
    The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
    • A. 

      Bluetooth v2.1

    • B. 

      Bluetooth v1.2

    • C. 

      Bluetooth v 1.0

    • D. 

      Bluetooth v 1.1

  • 9. 
    Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
    • A. 

      Active

    • B. 

      Passive

    • C. 

      Hybrid

    • D. 

      Neutral

  • 10. 
    A group of piconets in which connections exist between different piconets is called a ____.
    • A. 

      Broadnet

    • B. 

      Honeynet

    • C. 

      Boundnet

    • D. 

      Scatternet

  • 11. 
    ____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
    • A. 

      Bluesnarfing

    • B. 

      Bluejacking

    • C. 

      Bluecracking

    • D. 

      Bluetalking

  • 12. 
    ____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
    • A. 

      Bluejacking

    • B. 

      Bluecracking

    • C. 

      Bluesnarfing

    • D. 

      Bluetalking

  • 13. 
    A(n) ____ acts as the “base station” for the wireless network.
    • A. 

      AP

    • B. 

      Endpoint

    • C. 

      WMM

    • D. 

      Ad-hoc peer

  • 14. 
    A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
    • A. 

      random

    • B. 

      Sanctioned

    • C. 

      rogue

    • D. 

      Legitimate

  • 15. 
    An ____ is an AP that is set up by an attacker.
    • A. 

      Active twin

    • B. 

      Authorized twin

    • C. 

      Internal replica

    • D. 

      Evil twin

  • 16. 
    When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
    • A. 

      broadcast SSID

    • B. 

      Association request

    • C. 

      Disassociation request

    • D. 

      Connect request

  • 17. 
    The SSID can generally be any alphanumeric string from 2 to ___ characters.
    • A. 

      23

    • B. 

      28

    • C. 

      32

    • D. 

      34

  • 18. 
     is designed to detect any changes in a packet, whether accidental or intentional.
    • A. 

      CBC

    • B. 

      CRC

    • C. 

      AES

    • D. 

      TKIP

  • 19. 
    ____ is the encryption protocol standard for WPA2.
    • A. 

      AES-CCMP

    • B. 

      AES-CTR

    • C. 

      AES-TKIP

    • D. 

      AES-SCMP

  • 20. 
    Is a framework for transporting authentication protocols instead of the authentication protocol itself.
    • A. 

      PEAP

    • B. 

      TKIP

    • C. 

      SSL

    • D. 

      EAP

  • 21. 
    EAP request packets are issued by the ____.
    • A. 

      Supplicant

    • B. 

      Authenticator

    • C. 

      Authentication server

    • D. 

      Proxy

  • 22. 
    A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.
    • A. 

      ICMP

    • B. 

      TKIP

    • C. 

      EAP

    • D. 

      RADIUS

  • 23. 
    ____ requires mutual authentication used for WLAN encryption using Cisco client software.
    • A. 

      LEAP

    • B. 

      TKIP

    • C. 

      EAP

    • D. 

      PEAP

  • 24. 
     is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.
    • A. 

      TKIP

    • B. 

      LEAP

    • C. 

      PEAP

    • D. 

      ICMP

  • 25. 
    ____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
    • A. 

      Legitimate

    • B. 

      Rogue

    • C. 

      Sanctioned

    • D. 

      Twin

Back to Top Back to top