chp 15
Bluetooth devices cannot be secured.
false
In networks based on the Ethernet standard (802.3), stations transmit their information using the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) method.
true
Which of the following was the first wireless standard that saw any major usage outside of proprietary or custom deployments?
802.11 standard
Wi-Fi is a trademark, introduced in 1999 and owned by the Wi-Fi Alliance, that is used to brand wireless technologies that conform to the:
802.11 standard.
The first widely adopted wireless technology was:
802.11b.
Which of the following standards combines the best of both 802.11a and 802.11b?
802.11g
Which of the following allows someone authorized or unauthorized to send messages to a cell phone?
Bluejacking
Which of the following is used to steal data from a phone?
Bluesnarfing
In wireless networks based on the 802.11 standard, stations transmit their messages using the:
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).
Which of the following is NOT a countermeasure to threats against wireless LANs?
Promiscuous clients
Which of the following is NOT a threat to wireless LANs?
Secured connections
Which of the following is used to uniquely identify a network, thereby ensuring that clients can locate the correct wireless local area network (WLAN) that they should be attaching to?
Service set identifier (SSID)
Which one of the following is the strongest authentication technology for protecting wireless networks?
Wi-Fi Protected Access version 2 (WPA2)
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards, which range from 802.11a to 802.11n, are known collectively in standard jargon as:
Wi-Fi.
Ad hoc wireless networks are networks that use an access point (AP) that each client associates with.
false
An access point (AP), present in wired networks but not in wireless networks, is a device that wired clients associate with in order to gain access to the network.
false
NetStumbler is the only wireless hacking tool that can perform wireless network scanning.
false
The default access point (AP) security settings should never be changed.
false
Wardriving is the process of an attacker traveling through an area with the goal of detecting wireless access points (APs) or devices.
true
Which of the following is used to make calls or send text messages from the targeted device?
Bluebugging
Which of the following was NOT a benefit of the 802.11a over 802.11b?
Lower cost of equipment
Which of the following is a capability implemented through Bluetooth technology, designed to reach a maximum range on average of 10 meters or 30 feet?
Personal area network (PAN)
Which of the following is entered ahead of time for both the access point (AP) and client so they can authenticate and associate securely?
Preshared keys
Which of the following technologies is specifically designed to deliver Internet access over the so-called last mile to homes or businesses that may not otherwise be able to get access?
WiMAX
Which of the following technologies emerged for the first time in 1998 and was designed to be a short-range networking technology that could connect different devices together?
bluetooth
The widespread availability of wireless has made management and security much easier for the network and security administrator.
false
The 802.11n standard uses a new method of transmitting signals, which can transmit multiple signalsacross multiple antennas. This new method of transmitting signals is called:
multiple input and multiple output (MIMO).
Ad hoc networks can be created very quickly and easily because no access point (AP) is required in their setup.
true
Association with an access point (AP) occurs when a wireless client has the service set identifier (SSID) preconfigured for the network it is supposed to be attaching to.
true
Atmospheric conditions, building materials, and nearby devices can all affect emanations of wireless networks.
true
Bluetooth devices that are set to be seen or discovered by other Bluetooth devices can be seen by the owners of devices who have both good and bad intentions.
true
Bluetooth employs security mechanisms called "trusted devices," which have the ability to exchange data without asking any permission because they are already trusted to do so.
true
In wireless networks based on the 802.11 standard, stations transmit their information using the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).
true
Media access control (MAC) address filtering is a way to enforce access control on a wireless network by registering the MAC addresses of wireless clients with the access point (AP).
true
Placement of an access point (AP) is an important security consideration in defending a wireless network.
true
The early networks did not resemble the networks in use today because they were mainly proprietary and performed poorly compared with today's deployments.
true
The inSSIDer wireless hacking tool can inspect a WLAN and surrounding networks to troubleshoot competing access points (APs).
true
Wireless LANs are built upon the 802.11 family of standards and operate in a similar manner to wired networks.
true
Wireless networks use radio frequency (RF) or radio techniques, which allow wireless transmissions to reach out in all directions, enabling connectivity but also allowing anyone in those directions to eavesdrop.
true
A setup created by wireless networking technologies that are designed to extend or replace wired networks is called:
wireless local area network (WLAN).