Security Awareness - Unit 10 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is Bluetooth's rate of transmission? 1 Mbps 3 Mbps 2 Kbps 4 Kbps

1 Mbps

What serves as the network name identifier in a Wi-Fi network? MAC address WPS Pin number SSID WPA2 ID

SSID

Which of the following is an optional means of configuring WPA2 Personal security using a PIN? batch configuration security scripts SSID broadcast Wi-Fi Protected Setup (WPS)

Wi-Fi Protected Setup (WPS)

What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable? encryption private SSID lock screen ad hoc network

encryption

An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called? ad hoc network guest network evil twin VPN

evil twin

What is it called if a user disables the built-in limitations on their Apple iOS device to provide additional functionality? root logon ROM swapping jailbreaking remote lockout

jailbreaking

What security feature on a smartphone prevents the device from being used until a passcode is entered? lock screen encryption tracking remote wipe

lock screen

On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen? encryption remote wipe tracking lock screen

remote wipe

Which mobile device setting regulates when the device goes into hibernation mode? lock screen sleep time auto-locate root timeout

sleep time

What is the most secure option for the type of passcode that can be entered to access a mobile device? short PIN strong alphanumeric password swipe pattern user name

strong alphanumeric password

What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network? ad hoc network free access network virtual private network secure access network

virtual private network

From what term is war driving derived? chalk walking war dialing war walking walk dialing

war dialing

Which of the following is an attack that sends unsolicited messages to Bluetooth-enabled devices? Bluesurfing Bluejacking Bluesnarfing Bluephishing

Bluejacking

Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers? Bluephising Bluesurfing Bluesnarfing Bluejacking

Bluesnarfing

Whereas tablets are designed for performance, laptops are focused on ease of use. True False

False

Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers. True False

False

In the field of computer networking and wireless communications, what is the most widely known and influential organization? IEEE IETF W3C ACM

IEEE

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage. True False

True

Most Bluetooth devices have a range of only about 10 meters. True False

True

Unless remote management is essential, it is recommended that this feature be disabled with a wireless router. True False

True


Conjuntos de estudio relacionados

Chapter 21: Poverty, Inequality, and Discrimination

View Set

Chp 9: Identification Procedures

View Set

HLTH 1100 | HILLMAN | CHAPTER 3 QUIZ

View Set

Module 9: Social Psychology and experimental research quiz

View Set

Equivalent Fractions and Simplifying Fractions (Mixed Numbers)

View Set