Security+ Guide to Network Security Fundamentals - Chapter 8 Quiz Essay Example

Pages: 11 (724 words) Published: January 21, 2014
Chapter 8 Quiz – Security+ - A Guide to Network Security Fundamentals 

Question 1
0 out of 4 points
Bluetooth devices are not backward compatible with previous versions. Answer
Selected Answer:
Correct Answer:



True
False

Question 2
4 out of 4 points
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Answer
Selected Answer:
Correct Answer:



True
True

Question 3
4 out of 4 points
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Answer
Selected Answer:
Correct Answer:



False
False

Question 4
4 out of 4 points
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Answer
Selected Answer:
Correct Answer:

False
False



Question 5
4 out of 4 points
APs use antennas that radiate a signal in all directions.
Answer
Selected Answer:
Correct Answer:



True
True

Question 6
0 out of 4 points
Bluetooth is a ____ technology designed for data communication over short distances. Answer
Selected Answer:
Correct Answer:



c.
Private Area Network
d.
Personal Area Network

Question 7
4 out of 4 points
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet. Answer
Selected Answer:

d.
33

Correct Answer:

d.
33



Question 8
4 out of 4 points
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
Answer
Selected Answer:

a.
Bluetooth v1.2

Correct Answer:



a.
Bluetooth v1.2

Question 9
4 out of 4 points
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
Answer
Selected Answer:
Correct Answer:



a.
active
a.
active

Question 10
4 out of 4 points
A group of piconets in which connections exist between different piconets is called a ____.
Answer
Selected Answer:
Correct Answer:



d.
scatternet
d.
scatternet

Question 11
4 out of 4 points
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices. Answer
Selected Answer:
Correct Answer:



d.
Bluejacking
d.
Bluejacking

Question 12

4 out of 4 points
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers. Answer
Selected Answer:
Correct Answer:



d.
Bluesnarfing
d.
Bluesnarfing

Question 13
4 out of 4 points
A(n) ____ acts as the “base station” for the wireless network. Answer
Selected Answer:
Correct Answer:



d.
AP
d.
AP

Question 14
4 out of 4 points
An ____ is an AP that is set up by an attacker.
Answer
Selected Answer:
Correct Answer:



d.
evil twin
d.
evil twin

Question 15
4 out of 4 points
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
Answer
Selected Answer:

a.

association request
Correct Answer:



a.
association request

Question 16
4 out of 4 points
The SSID can generally be any alphanumeric string from 2 to ___ characters. Answer
Selected Answer:

c.
32

Correct Answer:

c.
32



Question 17
4 out of 4 points
____ is designed to detect any changes in a packet, whether accidental or intentional. Answer
Selected Answer:
Correct Answer:



a.
CRC
a.
CRC

Question 18
4 out of 4 points
____ is the encryption protocol standard for WPA2.
Answer
Selected Answer:
Correct Answer:



b.
AES-CCMP
b.
AES-CCMP

Question 19
4 out of 4 points

____ is a framework for transporting authentication protocols instead of the authentication protocol itself.
Answer
Selected Answer:
Correct Answer:



c.
EAP
c.
EAP

Question 20
4 out of 4 points
EAP request packets are issued...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Network Security Essay
  • Guide to Network Security quiz 3 Essay
  • Network Security Fundamental Essay
  • Network Security Fundamentals Essay
  • Essay about security
  • network security Essay
  • Essay on Network Security
  • Network Security Essay

Become a StudyMode Member

Sign Up - It's Free