hw 7
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
VPNs
A security might use SNMP Get commands to ________.
collect information to look for a rogue access point
802.11i 802.1X initial authentication mode was created for ________.
corporations with multiple access points
A security might use SNMP Set commands to ________.
change an access point's power
A change in power from 100 W to 1 W corresponds to approximately ________ decibels.
-20
A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile.
Bluetooth LE
A lamp in a Zigbee network would probably be a ________.
None of these
A group of devices on a desk that communicate wirelessly is called a ________.
PAN
An evil twin access point is usually ________.
a laptop computer
A rogue access point is usually created by ________.
an employee
802.11i provides ________.
both confidentiality and message integrity
A VPN provides ________.
end-to-end security
802.11i can defeat rogue access points.
false
802.11i PSK initial authentication mode was created for ________.
residences with a single access point
A ________ is an unauthorized internal access point.
rogue