Sie sind auf Seite 1von 2

Security+ Chapter 8 Answers 1. Bluetooth falls under the category of _______?

D Personal Area Network

2. A bluetooth network that contains one master and one slave using the same RF channel forms a _____________? D Piconet 3. ___________ is the unauthorized access of information from a wireless device through a bluetooth connection. D - Blue-snarfing

4. The IEEE _____________ standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum? B - 802.11a

5. Each of the following is an advantage of IEEE 802.1n except __________? A Smaller coverage area

6. Which of the following is not found in a residential WLAN gateway? A - IDS

7. Which of the following is not a requirement of war driving? C GPS receiver

8. The primary design of a ___________ is to capture the transmissions from legitimate users? A Evil Twin

9. Which of the following is a vulnerability of MAC address filtering? D MAC address are exchanged initially in unencrypted format.

10. Each of the following is a limitation of turning off the SSID broadcast from an AP except_________? D Users can more easily roam from one WLAN to another.

11. The primary weakness of Wired Equivalency privacy (WEP) is ____________? A Its usage creates a detectable pattern.

12. The two models for personal wireless security developed by the WiFi Alliance are WI-Fi Protected Access (WPA) and ___________? D - WPA2

13. WPA replaces WEP with___________? A - TKIP

14. A preshared key (PSK) of fewer than _________ characters may be subject to an attack if that key is a common dictionary word? D - 20

15. A WEP key length that is 128 bits in length _________? C IV the same as a WEP key of 64 bits

16. AES-CCMP is the encryption protocol standard used in __________? A - WPA2

17. What is the Extensible Authentication Protocol (EAP)? C A framework for transporting authentication protocols

18. Which technology should be used instead of LEAP? D - PEAP

19. Each of the following is a type of wireless AP probe except? D WNIC probe

20. The most flexible approach for a wireless VLAN is to have which device separate the packets? B - AP

Das könnte Ihnen auch gefallen