IS 350 UMBC Test-1
A rogue access point is usually created by ________. a) the IT security department b) an evil twin c) an external attacker d) an employee
d) an employee
A change in power from 2 mW to 205 mW corresponds to approximately ________ decibels. a) 20 b) 9 c) 3 d) 10
a) 20
A security might use SNMP Set commands to ________. a) change an access point's power b) collect information to look for a rogue access point c) both change an access point's power and collect information to look for a rogue access point d) neither change an access point's power nor collect information to look for a rogue access point
a) change an access point's power
A change in power from 100 W to 1 W corresponds to approximately ________ decibels. a) -10 b) -20 c) 20 d) 10
b) -20
A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile. a) classic Bluetooth b) Bluetooth LE c) both classic Bluetooth and Bluetooth LE d) neither classic Bluetooth nor Bluetooth LE
b) Bluetooth LE (Low Energy)
A group of devices on a desk that communicate wirelessly is called a ________. a) LAN b) PAN c) MAN d) WAN
b) PAN Personal Are Network
A security might use SNMP Get commands to ________. a) change an access point's power b) collect information to look for a rogue access point c) both change an access point's power and collect information to look for a rogue access point d) neither change an access point's power nor collect information to look for a rogue access point
b) collect information to look for a rogue access point
802.11i 802.1X initial authentication mode was created for ________. a) residences with less than eight access points b) corporations with multiple access points c) corporations with less than eight access points d) residences with a single access point
b) corporations with multiple access points
A VPN provides ________. a) link security b) end-to-end security c) comprehensive security d) None of these
b) end-to-end security
802.11i PSK initial authentication mode was created for ________. a) corporations with multiple access points b) residences with a single access point c) residences with less than eight access points d) corporations with less than eight access points
b) residences with a single access point
802.11i provides ________. a) confidentiality b) message integrity c) both confidentiality and message integrity d) neither confidentiality nor message integrity
c) both confidentiality and message integrity
A ________ is an unauthorized internal access point. a) binky b) shadow c) rogue d) None of these
c) rogue