CIS133 - Chapter 5 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Bluetooth's rate of transmission is ____ Mbps.

1

Because of a security weakness it is important that key values exceed ____ at least characters in length.

20

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.

802.11g

____ cryptography uses two keys.

Asymmetric

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

Bluejacking

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

Bluesnarfing

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.

Bluetooth

Whereas tablets are designed for performance, laptops are focused on ease of use.

False

Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.

False

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

IEEE

A(n) ____ address is a unique hardware number that is "burned in" to each wireless network interface card adapter.

MAC

____ cryptography uses same single key to encrypt and decrypt a document.

Private key

The ____ in a Wi-Fi network serves as the network name identifier.

SSID

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.

True

Most Bluetooth devices have a range of only 33 feet (10 meters).

True

Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.

True

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.

Wi-Fi Protected Setup (WPS)

Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop.

ad hoc

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.

auto-lock

A(n) ____ is a method used by operating systems to store, retrieve, and organize files.

file system

Most encryption for data stored on a laptop uses ____ cryptography.

private key

On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.

remote wipe

Private key cryptography is also called ____ cryptography.

symmetric

A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.

virtual private network

War driving is derived from the term ____.

war dialing

Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.

whole disk


Conjuntos de estudio relacionados

Managerial Accounting Chapter 13

View Set

ApplyIt & Critical thinking | CELL STRUCTURES AND THEIR FUNCTIONS

View Set

AR Health Guaranteed Exam Missed

View Set

Final exam physio 58 lecture only 1-3

View Set

Chapter 24: Alterations in Genitourinary Function

View Set

CIST 1130- Week 7 - Lesson 7.3, 12.2, 12.3 and 12.4

View Set