Filters
Question type

Study Flashcards

WEP is a strong core security protocol.

A) True
B) False

Correct Answer

verifed

verified

PSK mode automatically prevents the use of weak keys.

A) True
B) False

Correct Answer

verifed

verified

802.11i offers stronger security than WPA.

A) True
B) False

Correct Answer

verifed

verified

What security protocol originally came with 802.11 equipment?


A) 802.11e
B) 802.11i
C) WPA
D) WEP

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

An 8/1 decrease in power corresponds to approximately ________ decibels.


A) 3
B) 6
C) 9
D) none of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile,which device is initially the master?


A) the Bluetooth phone
B) the Bluetooth headset
C) Both are simultaneously masters and slaves.

D) A) and C)
E) All of the above

Correct Answer

verifed

verified

Bluetooth is for ________.


A) large WLANs
B) cable replacement
C) both A and B
D) neither A nor B

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The most popular standard for extended 802.1X security is ________.


A) EAP-TTLS
B) MS-EAP
C) EAP-TLS
D) PEAP

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Passive RFID chips are powered by ________.


A) a battery
B) the sun
C) body temperature
D) the signal sent by the device querying the RFID chip

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

802.1X needs security between the authenticator and the computer in ________.


A) ethernet
B) 802.11i
C) both A and B
D) neither A nor B

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

UWB channels are wider than a full service band.

A) True
B) False

Correct Answer

verifed

verified

In Bluetooth,a master can have up to ________ slaves at any moment.


A) 1
B) 3
C) 12
D) none of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Centralized access point management ________.


A) increases management costs but provides better control
B) reduces management costs

C) A) and B)
D) undefined

Correct Answer

verifed

verified

A notebook computer configured to act like a real access point is a rogue access point.

A) True
B) False

Correct Answer

verifed

verified

Which form of Bluetooth has a typical transmission speed of about 24 Mbps?


A) Classic Bluetooth
B) High-Speed Bluetooth
C) Low-Energy Bluetooth
D) none of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Centralized access point management raises management costs.

A) True
B) False

Correct Answer

verifed

verified

False

Who created WPA?


A) the Internet Engineering Task Force
B) the 802.1 Working Group
C) the 802.11 Working Group
D) the Wi-Fi Alliance

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

D

How long does it take an attacker to crack WEP today with readily available software?


A) about ten seconds
B) about ten minutes
C) about ten hours
D) WEP cannot be cracked with readily available software.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is usually set up by a hacker outside the building?


A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

B

802.11i is attractive compared with WPA because ________.


A) 802.11i offers stronger security
B) 802.11i offers quality of service
C) 802.11i was standardized by the Wi-Fi Alli
D) all of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 75

Related Exams

Show Answer