CIS 321 Quiz 7
What is the strongest security protocol for 802.11 today?
802.11i
A security might use SNMP Get commands to ________ and SNMP Set commands to _______.
collect information to look for a rogue access point, change an access point's power
Bluetooth uses ________ operation.
one-to-one
Wi-Fi direct ________ uses access points.
never
Site surveys should be done ________. A. after the initial provisional placement of access points B. periodically afterwards C. both A and B D. neither A nor B
C. both A and B
What initial authentication mode does 802.11i use? A. 802.1X B. PSK C. both A and B D. neither A nor B
C. both A and B
Which of the following is a risk in 802.11i PSK mode? A. Unauthorized sharing of the pre-shared key. B. A weak passphrase may be selected. C. both A and B D. neither A nor B
C. both A and B
Which of the following is an ad hoc networking protocol? A. Zigbee B. Z-Wave C. both A and B D. neither A nor B
C. both A and B
A group of devices on a desk that communicate wirelessly is called a ________.
PAN
When two devices communicate using NFC, how close must they be?
a few inches
In 802.11i, protection, confidentiality, and message integrity are provided between the client and the ________.
access point
Which of the following is usually set up by a hacker outside the building?
an evil twin access point
In Bluetooth LE, ________ provide information.
beacons
If Wi-Fi supported the basic printing profile, ________.
documents could be printed without downloading drivers
A VPN provides ________.
end-to-end security
IoT transmissions usually involve ________.
low transmission distances
802.11i PSK initial authentication mode was created for ________ and 802.11i 802.1X initial authentication mode was created for ________.
residences with a single access point, corporations with multiple access points
A ________ is an unauthorized internal access point.
rogue
Passive RFID chips get the power needed to transmit from ________.
the electricity that always flows through the air in small quantities
In 802.1x initial authentication mode, the authenticator is the ________.
wireless access point