Preview

Security+ Guide to Network Security Fundamentals - Chapter 8 Quiz Essay Example

Satisfactory Essays
Open Document
Open Document
724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security+ Guide to Network Security Fundamentals - Chapter 8 Quiz Essay Example
Chapter 8 Quiz – Security+ - A Guide to Network Security Fundamentals


Question 1
0 out of 4 points
Bluetooth devices are not backward compatible with previous versions.
Answer
Selected Answer:
Correct Answer:



True
False

Question 2
4 out of 4 points
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Answer
Selected Answer:
Correct Answer:



True
True

Question 3
4 out of 4 points
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Answer
Selected Answer:
Correct Answer:



False
False

Question 4
4 out of 4 points
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Answer
Selected Answer:
Correct Answer:

False
False



Question 5
4 out of 4 points
APs use antennas that radiate a signal in all directions.
Answer
Selected Answer:
Correct Answer:



True
True

Question 6
0 out of 4 points
Bluetooth is a ____ technology designed for data communication over short distances.
Answer
Selected Answer:
Correct Answer:



c.
Private Area Network
d.
Personal Area Network

Question 7
4 out of 4 points
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
Answer
Selected Answer:

d.
33

Correct Answer:

d.
33



Question 8
4 out of 4 points
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the
____ specifications.
Answer
Selected Answer:

a.
Bluetooth v1.2

Correct Answer:



a.
Bluetooth v1.2

Question 9
4 out of 4 points
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
Answer
Selected Answer:
Correct Answer:



a. active a. active Question 10
4 out of 4 points
A group of piconets in which connections

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What would be the effect of removing either the Matching Principle or the Revenue Recognition Principle from the process? Use a concrete example of how doing so might affect accounting in a given period.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If you are applying an extended ACL to deny specific packets, where should you apply it, as close to the source as possible or as close to the destination as possible? Explain your answer.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    You have recently been appointed to a position of financial analyst with a large manufacturing concern. Your immediate superior has brought the CFO into your office, explaining that you are a graduate from the Accounting and Financial Management program at the University of Waterloo, and therefore, you are a computer wizard.…

    • 567 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Question 1: What would the first-year costs be to AML if it purchased the 10 used 20-foot containers? How long would it take to recoup the investment, assuming that the mushroom traffic continued?…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4. What combination of the two goods below allows you to maximize your utility with a budget constraint of $14? Show how you arrived at your conclusion in the space provided below. Place your final answers on the lines at the bottom of this page.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | In the Classical Theory, if businesses want fewer funds, the interest rate will _________ and people will save less…

    • 4050 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Quiz 1 Essay Example

    • 809 Words
    • 4 Pages

    6. In medical word building, a combining form is used to link a suffix that begins with:…

    • 809 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Secret Sharer is a short story that is written by Joseph Conrad. It is an interesting story that makes people ask questions. This is a story about a newly-promoted young nameless captain who hides a murderer called Leggatt on his ship. Leggatt swims to the captain's ship after killing one of his shipmates on a ship named the Sephora. Leggatt is then met by the captain who is on lookout duty alone. After having a little chat with Leggatt, he hides Leggatt in his cabin. The captain even lies for Leggatt when the skipper of the Sephora visits him. After that, the captain brings his ship close to the land so that Leggatt can escape safely.…

    • 821 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The term computer _____ best describes the level of technology skills needed in today’s business.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Toshendra Sharma, 113050013 Saptarshi Sarkar, 113050044 Pankaj Vanwari, 114058001 Under guidance of: Prof. Bernard Menezes Outline  Bluetooth history  Bluetooth Protocol  Layers in Bluetooth  Security in Bluetooth  Vulnerabilities  Attacks/Exploits  Demonstration Bluetooth Technology  proprietary open wireless technology standard for exchanging data over short distances  was originally conceived as a wireless alternative to RS232 data cables  It uses short wave length radio transmission in ISM band from 2400-2480 MHz Benefits of Bluetooth Technology  Cable replacement  Ease of file sharing  Wireless synchronization  Internet connectivity Implementation  frequency hopping spread spectrum  chops up the data being sent and transmits chunks of it up to 79 bands  Packet Based Protocol with a Master-Slave Structure  Piconet  A piconet is an ad-hoc computer network which used to link group of devices, where protocols allow one master device to interconnect with up to seven active slaves…

    • 935 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Java Bluetooth

    • 29009 Words
    • 117 Pages

    In March 2002 a final year thesis project was undertaken based on a suggestion by Henry Valk of HCV Wireless to investigate the development of a Java application for a Bluetooth platform. The Bluetooth standard is a short range wireless technology that allows different types of devices to form automatic, spontaneous networks. Java applications are portable, secure and robust, which makes them suitable for users of Bluetooth devices to wirelessly download and use to access a service.…

    • 29009 Words
    • 117 Pages
    Powerful Essays
  • Good Essays

    Bluetooth

    • 8041 Words
    • 33 Pages

    Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.…

    • 8041 Words
    • 33 Pages
    Good Essays