CIS133 - Chapter 5 Quiz
Bluetooth's rate of transmission is ____ Mbps.
1
Because of a security weakness it is important that key values exceed ____ at least characters in length.
20
IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.
802.11g
____ cryptography uses two keys.
Asymmetric
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
Bluesnarfing
There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.
Bluetooth
Whereas tablets are designed for performance, laptops are focused on ease of use.
False
Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.
False
In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.
IEEE
A(n) ____ address is a unique hardware number that is "burned in" to each wireless network interface card adapter.
MAC
____ cryptography uses same single key to encrypt and decrypt a document.
Private key
The ____ in a Wi-Fi network serves as the network name identifier.
SSID
Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.
True
Most Bluetooth devices have a range of only 33 feet (10 meters).
True
Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.
True
As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.
Wi-Fi Protected Setup (WPS)
Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop.
ad hoc
On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.
auto-lock
A(n) ____ is a method used by operating systems to store, retrieve, and organize files.
file system
Most encryption for data stored on a laptop uses ____ cryptography.
private key
On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.
remote wipe
Private key cryptography is also called ____ cryptography.
symmetric
A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.
virtual private network
War driving is derived from the term ____.
war dialing
Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.
whole disk