hw 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

VPNs

A security might use SNMP Get commands to ________.

collect information to look for a rogue access point

802.11i 802.1X initial authentication mode was created for ________.

corporations with multiple access points

A security might use SNMP Set commands to ________.

change an access point's power

A change in power from 100 W to 1 W corresponds to approximately ________ decibels.

-20

A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile.

Bluetooth LE

A lamp in a Zigbee network would probably be a ________.

None of these

A group of devices on a desk that communicate wirelessly is called a ________.

PAN

An evil twin access point is usually ________.

a laptop computer

A rogue access point is usually created by ________.

an employee

802.11i provides ________.

both confidentiality and message integrity

A VPN provides ________.

end-to-end security

802.11i can defeat rogue access points.

false

802.11i PSK initial authentication mode was created for ________.

residences with a single access point

A ________ is an unauthorized internal access point.

rogue


Conjuntos de estudio relacionados

Chapter 34 Obstetrics and Neonatal Care

View Set

Chapter 34 Obstetrics and Neonatal Care

View Set

ADAMS INTERNATIONAL SCHOOL. HISTORY STUDY GUIDE FOR WEEK #18 MID-TERM EXAM

View Set