chp 15

¡Supera tus tareas y exámenes ahora con Quizwiz!

Bluetooth devices cannot be secured.

false

In networks based on the Ethernet standard (802.3), stations transmit their information using the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) method.

true

Which of the following was the first wireless standard that saw any major usage outside of proprietary or custom deployments?

802.11 standard

Wi-Fi is a trademark, introduced in 1999 and owned by the Wi-Fi Alliance, that is used to brand wireless technologies that conform to the:

802.11 standard.

The first widely adopted wireless technology was:

802.11b.

Which of the following standards combines the best of both 802.11a and 802.11b?

802.11g

Which of the following allows someone authorized or unauthorized to send messages to a cell phone?

Bluejacking

Which of the following is used to steal data from a phone?

Bluesnarfing

In wireless networks based on the 802.11 standard, stations transmit their messages using the:

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).

Which of the following is NOT a countermeasure to threats against wireless LANs?

Promiscuous clients

Which of the following is NOT a threat to wireless LANs?

Secured connections

Which of the following is used to uniquely identify a network, thereby ensuring that clients can locate the correct wireless local area network (WLAN) that they should be attaching to?

Service set identifier (SSID)

Which one of the following is the strongest authentication technology for protecting wireless networks?

Wi-Fi Protected Access version 2 (WPA2)

The Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards, which range from 802.11a to 802.11n, are known collectively in standard jargon as:

Wi-Fi.

Ad hoc wireless networks are networks that use an access point (AP) that each client associates with.

false

An access point (AP), present in wired networks but not in wireless networks, is a device that wired clients associate with in order to gain access to the network.

false

NetStumbler is the only wireless hacking tool that can perform wireless network scanning.

false

The default access point (AP) security settings should never be changed.

false

Wardriving is the process of an attacker traveling through an area with the goal of detecting wireless access points (APs) or devices.

true

Which of the following is used to make calls or send text messages from the targeted device?

Bluebugging

Which of the following was NOT a benefit of the 802.11a over 802.11b?

Lower cost of equipment

Which of the following is a capability implemented through Bluetooth technology, designed to reach a maximum range on average of 10 meters or 30 feet?

Personal area network (PAN)

Which of the following is entered ahead of time for both the access point (AP) and client so they can authenticate and associate securely?

Preshared keys

Which of the following technologies is specifically designed to deliver Internet access over the so-called last mile to homes or businesses that may not otherwise be able to get access?

WiMAX

Which of the following technologies emerged for the first time in 1998 and was designed to be a short-range networking technology that could connect different devices together?

bluetooth

The widespread availability of wireless has made management and security much easier for the network and security administrator.

false

The 802.11n standard uses a new method of transmitting signals, which can transmit multiple signalsacross multiple antennas. This new method of transmitting signals is called:

multiple input and multiple output (MIMO).

Ad hoc networks can be created very quickly and easily because no access point (AP) is required in their setup.

true

Association with an access point (AP) occurs when a wireless client has the service set identifier (SSID) preconfigured for the network it is supposed to be attaching to.

true

Atmospheric conditions, building materials, and nearby devices can all affect emanations of wireless networks.

true

Bluetooth devices that are set to be seen or discovered by other Bluetooth devices can be seen by the owners of devices who have both good and bad intentions.

true

Bluetooth employs security mechanisms called "trusted devices," which have the ability to exchange data without asking any permission because they are already trusted to do so.

true

In wireless networks based on the 802.11 standard, stations transmit their information using the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).

true

Media access control (MAC) address filtering is a way to enforce access control on a wireless network by registering the MAC addresses of wireless clients with the access point (AP).

true

Placement of an access point (AP) is an important security consideration in defending a wireless network.

true

The early networks did not resemble the networks in use today because they were mainly proprietary and performed poorly compared with today's deployments.

true

The inSSIDer wireless hacking tool can inspect a WLAN and surrounding networks to troubleshoot competing access points (APs).

true

Wireless LANs are built upon the 802.11 family of standards and operate in a similar manner to wired networks.

true

Wireless networks use radio frequency (RF) or radio techniques, which allow wireless transmissions to reach out in all directions, enabling connectivity but also allowing anyone in those directions to eavesdrop.

true

A setup created by wireless networking technologies that are designed to extend or replace wired networks is called:

wireless local area network (WLAN).


Conjuntos de estudio relacionados

Psychology: Unit 4: CONSCIOUSNESS AND SLEEP

View Set

[Lección 4] Estructura 2.2 - Quiero ir

View Set

History of Architecture: Pre-historic Architecture

View Set

Christina Faith and Living Unit 10

View Set

Chapter 2 interpersonal communication

View Set

Chapter 49: Nursing Care of the Child With an Alteration in Genetics

View Set