Security+ Guide to Network Security Fundamentals - Chapter 8 Quiz Essay Example
Question 1
0 out of 4 points
Bluetooth devices are not backward compatible with previous versions. Answer
Selected Answer:
Correct Answer:
True
False
Question 2
4 out of 4 points
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Answer
Selected Answer:
Correct Answer:
True
True
Question 3
4 out of 4 points
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Answer
Selected Answer:
Correct Answer:
False
False
Question 4
4 out of 4 points
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Answer
Selected Answer:
Correct Answer:
False
False
Question 5
4 out of 4 points
APs use antennas that radiate a signal in all directions.
Answer
Selected Answer:
Correct Answer:
True
True
Question 6
0 out of 4 points
Bluetooth is a ____ technology designed for data communication over short distances. Answer
Selected Answer:
Correct Answer:
c.
Private Area Network
d.
Personal Area Network
Question 7
4 out of 4 points
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet. Answer
Selected Answer:
d.
33
Correct Answer:
d.
33
Question 8
4 out of 4 points
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
Answer
Selected Answer:
a.
Bluetooth v1.2
Correct Answer:
a.
Bluetooth v1.2
Question 9
4 out of 4 points
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
Answer
Selected Answer:
Correct Answer:
a.
active
a.
active
Question 10
4 out of 4 points
A group of piconets in which connections exist between different piconets is called a ____.
Answer
Selected Answer:
Correct Answer:
d.
scatternet
d.
scatternet
Question 11
4 out of 4 points
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices. Answer
Selected Answer:
Correct Answer:
d.
Bluejacking
d.
Bluejacking
Question 12
4 out of 4 points
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers. Answer
Selected Answer:
Correct Answer:
d.
Bluesnarfing
d.
Bluesnarfing
Question 13
4 out of 4 points
A(n) ____ acts as the “base station” for the wireless network. Answer
Selected Answer:
Correct Answer:
d.
AP
d.
AP
Question 14
4 out of 4 points
An ____ is an AP that is set up by an attacker.
Answer
Selected Answer:
Correct Answer:
d.
evil twin
d.
evil twin
Question 15
4 out of 4 points
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
Answer
Selected Answer:
a.
association request
Correct Answer:
a.
association request
Question 16
4 out of 4 points
The SSID can generally be any alphanumeric string from 2 to ___ characters. Answer
Selected Answer:
c.
32
Correct Answer:
c.
32
Question 17
4 out of 4 points
____ is designed to detect any changes in a packet, whether accidental or intentional. Answer
Selected Answer:
Correct Answer:
a.
CRC
a.
CRC
Question 18
4 out of 4 points
____ is the encryption protocol standard for WPA2.
Answer
Selected Answer:
Correct Answer:
b.
AES-CCMP
b.
AES-CCMP
Question 19
4 out of 4 points
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.
Answer
Selected Answer:
Correct Answer:
c.
EAP
c.
EAP
Question 20
4 out of 4 points
EAP request packets are issued...
Please join StudyMode to read the full document