MIS 3317 - m2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

18) The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________. A) keystroke loggers B) anti-privacy software C) spyware D) data mining software

C

58) To defeat brute-force attacks, a password must be ________. A) long B) complex C) both A and B D) neither A nor B

C

74) Which type of firewall filtering looks at application-layer content? A) static packet filtering B) stateful packet inspection C) NGFW D) all of the above

C

75) NGFWs ________. A) can implement different rules for different applications B) can detect threats that span multiple packets C) both A and B D) neither A nor B

C

76) If a packet is highly suspicious but not a provable attack packet, a(n) ________ may drop it. A) SPI firewall B) IDS C) IPS D) all of the above

C

In CSMA/CA, CS means ________. A) cancel sending B) counter-source C) carriage suspension D) carrier sense

Carrier Sense

16) Malware programs that masquerade as system files are called ________. A) viruses B) scripts C) payloads D) Trojan horses

D

39) What type of attacker can do the most damage? A) criminal attackers B) hackers driven by curiosity C) employees and ex-employees D) national governments

D

In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait. A) CSMA/CA+ACK B) CSMA/CA C) CSMA/CD D) RTS/CTS

RTS/CTS

To connect to an access point, you must know its ________. A) SSID B) ESSID C) IP address D) Wi-Fi ID

SSID

The Wi-Fi Alliance calls 802.11i ________. A) WEP B) WPA C) WPA2 D) none of the above

WPA2

Wi-Fi is a term used by the ________. A) IEEE B) Wi-Fi Alliance C) both A and B D) neither A nor B

Wi-Fi Alliance

________ have SSIDs. A) Wireless clients B) Wireless access points C) both A and B D) neither A nor B

Wireless access points

In Zigbee, ad hoc networking's mesh is operated by ________. A) Zigbee Controllers B) Zigbee End Devices C) Zigbee Routers D) Zigbee Hives

Zigbee Routers

Bluetooth LE normally uses ________ for power. A) a coin battery B) wall power C) both A and B D) neither A nor B

a coin battery

When two devices communicate using NFC, how close must they be? A) a few inches B) up to 5 feet C) up to 10 feet D) up to 50 feet

a few inches

An evil twin access point is usually ________. A) a database B) a laptop computer C) a calculator D) a spreadsheet

a laptop computer

Site surveys should be done ________. A) after the initial provisional placement of access points B) periodically afterwards C) both A and B D) neither A nor B

both A and B

An FM radio station is called Moldy Oldies 101.1. The 101.1 refers to its ________. A) single frequency B) channel C) service band D) none of the above

channel

T/F Employees who set up rogue access points usually have malicious motives.

False

Most wireless systems operate in the ________ range. A) hz B) kHz C) MHz D) GHz

GHz

Communication after authentication is protected most strongly if the ________ initial authentication is used. A) PSK B) 802.1X C) WPA D) It does not matter which initial authentication mode is used.

It does not matter which initial authentication mode is used

Bluetooth ________ is likely to be used most of the time in IoT transmission. A) HDR B) HS C) LE D) COIN

LE

________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time. A) Creating extended service sets B) Roaming C) The distribution system D) Media access control

Media access control

The most serious problem with wireless transmission in WLANs is ________. A) inverse square law attenuation B) absorptive attenuation C) shadow zones D) multipath interference

multipath interference

CSMA/CA+ACK is ________. A) unreliable B) reliable C) semireliable

reliable

We use the terms Wi-Fi and ________ interchangeably in this book. A) 802.1 B) 802.3 C) 802.11 D) 802.1X

802.11

11) Which of the following attach themselves to other programs? A) Viruses B) Worms C) both A and B D) neither A nor B

A

12) Viruses most commonly spread from one computer to another ________. A) via e-mail B) by propagating directly by themselves C) through obfuscation D) all of the above

A

20) Small malware programs that download larger malware programs are called ________. A) downloaders B) scouts C) foothold programs D) stage-one programs

A

24) An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. (Select the most specific answer.) A) phishing B) identity theft C) social engineering D) a spyware attack

A

28) Which of the following meets the definition of hacking ________. A) to intentionally use a computer resource without authorization B) to use a computer on which you have an account for unauthorized purposes C) both A and B D) neither A nor B

A

29) If you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in? A) Yes B) No C) We cannot say from the information given.

A

68) Debit card is secure because it requires two credentials for authentication. This is also called ________. A) the supplicant's authentication B) the verifier's authentication C) two-factor authentication D) none of the above

C

69) When a firewall identifies an attack packet, it ________. A) discards the packet B) copies information about the packet into a log file C) both A and B D) neither A nor B

C

7) A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem. A) malware B) security error C) vulnerability D) security fault

C

55) Prepare2 can be cracked most quickly by a(n) ________. A) authentication attack B) brute-force attack C) dictionary attack D) hybrid dictionary attack

D

The ________ standard dominates IoT transmission today. A) Bluetooth B) Zigbee C) Wi-Fi direct D) none of the above

none of the above

What is the main promise of 802.11ax over 802.11ac? A) higher speed B) the ability to serve more users C) MIMO D) Mu-MIMO

the ability to serve more users

WLANs normally use ________. A) licensed bands B) unlicensed bands C) both A and B D) neither A or B

unlicensed bands

In unlicensed bands, ________. A) you can use radios wherever you please B) you can prevent nearby businesses from setting up access points in the same channel C) both A and B D) neither A nor B

you can use radios wherever you please

T/F 802.11i can defeat rogue access points.

False

T/F If two products both comply with 802.11 ac, their performance will always be similar.

False

T/F In a Wi-Fi LAN, wireless hosts generally send frames directly to one another.

False

T/F Nearly all public Wi-Fi hotspots encrypt your transmissions.

False

T/F Within a BSS (and without MU-MIMO), the access point and a wireless host it serves can transmit at the same time.

False

T/F You can test whether an evil twin attack has taken place against your wireless client.

False

802.11 operates in the ________ unlicensed service band. A) 2.4 MHz B) 60 MHz C) both A and B D) neither A nor B

both A and B

802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B

both A and B

As your wireless client travels away from an access point, ________. A) errors begin to increase B) your transmission speed decreases C) both A and B D) neither A nor B

both A and B

802.11i 802.1X initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points

corporations with multiple access points

A VPN provides ________. A) link security B) end-to-end security C) comprehensive security D) none of the above

end-to-end security

Spread spectrum transmission's wider channels brings ________. A) greater speed B) greater reliability C) greater security D) none of the above

greater reliability

Frequency is measured in terms of ________. A) nanometers B) hertz C) microns D) microseconds

hertz

Wi-Fi direct ________ uses access points. A) always B) usually C) rarely D) never

never

Bluetooth uses ________ operation. A) all-to-all B) point-to-multipoint C) one-to-all D) one-to-one

one-to-one

If a master has multiple slaves, Bluetooth will use ________ operation. A) all-to-all B) point-to-multipoint C) one-to-all D) one-to-one

one-to-one

Wireless network standards operate at ________. A) the data link layer B) the Internet layer C) both A and B D) neither A nor B

the data link layer

Which offers stronger security? A) WPA B) 802.11i C) both A and B offer equally strong security.

802.11i

3) Which of the following probably suffered the most financial damage from the Target breach? A) Target B) banks C) consumers D) POS vendors

A

30) You discover that you can get into other e-mail accounts after you have logged in under your account. You spend just a few minutes looking at another user's mail. Is that hacking? A) Yes B) No C) We cannot say from the information given.

A

10) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B

B

13) Which of the following sometimes uses direct propagation between computers? A) viruses B) worms C) Trojan horses D) downloaders

B

27) Which of the following tends to be more damaging to the victim? A) credit card theft B) identity theft C) Both are about equally damaging to the victim. D) Neither is damaging to the victim.

B

32) DoS attacks attempt to ________. A) hack a computer B) reduce the availability of a computer C) steal information from a computer D) delete files on a computer

B

35) Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.) A) Trojan horses B) bots C) viruses D) worms

B

36) Advanced persistent threats are ________. A) inexpensive for the attacker B) extremely dangerous for the victim C) both A and B D) neither A nor B

B

49) Requiring someone to use a resource to prove his or her identity is ________. A) confidentiality B) authentication C) authorization D) both B and C

B

Channels with wide bandwidths are called ________ channels. A) multimode B) full-duplex C) broadband D) parallel

broadband

To transmit data very rapidly, you would want a ________ channel. A) narrowband B) broadband C) single-frequency band D) single-mode

broadband

A security might use SNMP Set commands to ________. A) change an access point's power B) collect information to look for a rogue access point C) both A and B D) neither A nor B

change an access point's power

A security might use SNMP Get commands to ________. A) change an access point's power B) collect information to look for a rogue access point C) both A and B D) neither A nor B

collect information to look for a rogue access point

Bluetooth Low Energy ________. A) provides much higher speed than other IoT transmission standards B) provides energy to power the other device C) does not require batteries D) conserves battery power

conserves battery power

1) The Target attackers probably first broke into Target using the credentials of a(n) ________. A) low-level Target employee B) Target IT employee C) Target security employee D) employee in a firm outside Target

D

40) A specific encryption method is called a ________. A) code B) schema C) key method D) cipher

D

5) The general name for evil software is ________. A) virus B) worm C) exploit D) malware

D

Which of the following is usually set up by a hacker outside the building? A) a rogue access point B) an evil twin access point C) both A and B D) neither A nor B

an evil twin access point

Because of ________, an 802.11AX access point can communicate with an 802.11AY client. A) MIMO B) MU-MIMO C) backward compatibility D) They CANNOT communicate.

backward compatibility

Access points take ________ from wireless devices and send them on to devices on the wired LAN. A) packets B) frames C) both A and B D) neither A nor B

packets

In what initial authentication mode of 802.11i is a central authentication server used? A) 802.1X B) PSK C) both A and B D) neither A nor B

802.1X

17) If a firm has many access points, it should use ________ initial authentication mode in 802.11i. A) PSK B) 802.1X C) IPsec D) WPA

802.1X

Simple installation rules are sufficient to reduce propagation problems to nonissues in ________. A) 802.3 B) 802.11 C) both A and B D) neither A nor B

802.3

A change in power from 2 mW to 17 mW corresponds to approximately ________ decibels. A) 3 B) 9 C) 12 D) 20

9

51) ________ is the general name for proofs of identity in authentication. A) Credentials B) Authorizations C) Certificates D) Signatures

A

19) A program that can capture passwords as you enter them is ________. A) a keystroke logger B) data mining software C) both A and B D) neither A nor B

A

21) Unsolicited commercial e-mail is better known as ________. A) spam B) adware C) social engineering D) identity theft

A

23) Tricking users into doing something against their security interests is ________. A) social engineering B) hacking C) both A and B D) neither A nor B

A

33) Attack programs that can be remotely controlled by an attacker are ________. A) bots B) DoS programs C) exploits D) sock puppets

A

4) Which of the following probably suffered the most financial damage from the Target breach? A) retailers other than Target B) banks C) consumers D) POS terminal vendors

A

42) In two-way dialogues using symmetric key encryption, how many keys are used for encryption and decryption? A) 1 B) 2 C) 4 D) none of the above

A

44) Electronic signatures provide message-by-message ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

A

45) Electronic signatures also provide ________ in addition to authentication. A) message integrity B) message encryption C) both A and B D) neither A nor B

A

47) SSL/TLS is used for ________. A) Web applications B) any application C) both A and B D) neither A nor B

A

48) Using SSL/TLS for Web applications is attractive because SSL/TLS ________. A) is essentially free to use B) offers the strongest possible cryptographic protections C) both A and B D) neither A nor B

A

50) In authentication, the ________ is the party trying to prove his or her identity. A) supplicant B) verifier C) true party D) all of the above

A

57) The password "velociraptor" can be defeated most quickly by a ________. A) dictionary attack B) reverse engineering attack C) brute-force attack D) None of the above because it is more than 8 characters long.

A

64) In digital certificate authentication, the supplicant encrypts the challenge message with ________. A) the supplicant's private key B) the verifier's private key C) the true party's private key D) none of the above

A

70) A firewall will drop a packet if it ________. A) is a definite attack packet B) is a probable attack packet C) both A and B D) neither A nor B

A

8) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) doing a zero-day installation C) using an antivirus program D) all of the above

A

17) Trojan horses can spread by ________. A) e-mailing themselves to victim computers B) directly propagating to victim computers C) both A and B D) neither A nor B

D

22) Pieces of code that are executed after the virus or worm has spread are called ________. A) vulnerabilities B) exploits C) compromises D) payloads

D

After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) pairwise session C) 802.1X D) preshared

pairwise session

14) Which of the following can spread more rapidly? A) directly-propagating viruses B) directly-propagating worms C) Both of the above can spread with approximately equal speed.

B

2) The Target attackers sold their stolen card information to ________. A) crimeware shops B) card shops C) card counterfeiters D) Hallmark

B

25) An attack aimed at a single person or a small group of individuals is a(n) ________ attack. (Choose the most specific answer.) A) phishing B) spear phishing C) highly targeted D) customized

B

37) What type of attacker are most of attackers today? A) disgruntled employees and ex-employees B) career criminals C) hackers motivated by a sense of power D) cyberterrorists

B

41) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

B

46) The messages of VPNs ________. A) share the same transmission lines B) are encrypted C) both A and B D) neither A nor B

B

52) Authentication should generally be ________. A) as strong as possible B) appropriate for a specific resource C) the same for all resources, for consistency D) all of the above

B

63) Which of the following can be done today without the target's knowledge? A) iris scanning B) face recognition C) both A and B D) neither A nor B

B

66) In digital certificate authentication, the verifier uses ________. A) the supplicant's public key B) the true party's public key C) both A and B D) neither A nor B

B

71) Firewall log files should be read ________. A) every month B) every day C) every week D) usually only when a serious attack is suspected

B

72) Egress filtering examines packets ________. A) arriving from the outside B) leaving to the outside C) both A and B D) neither A nor B

B

77) In a firewall, VPN traversal ________. A) increases the effectiveness of firewall filtering B) reduces firewall filtering effectiveness C) both A and B D) neither A nor B

B

78) If a firewall does not have the processing power to filter all of the packets that arrive, ________. A) it will pass some packets without filtering them B) it will drop packets it cannot process C) both A and B D) neither A nor B

B

56) A password-cracking attack that tries all combinations of keyboard characters is called a ________. A) dictionary attack B) hybrid mode dictionary attack C) brute-force attack D) comprehensive keyboard attack

C

59) The password "NeVEr" can be defeated by a ________. A) dictionary attack B) hybrid dictionary attack C) brute-force attack D) none of the above

C

60) The password "R7%t&" can be defeated by a ________. A) dictionary attack B) hybrid mode dictionary attack C) brute-force attack D) All of the above could defeat the password equally quickly.

C

61) Which of the following is a form of biometrics? A) reusable passwords B) digital certificate authentication C) facial recognition D) all of the above

C

The 802.11 standard has two mechanisms for media access control. Of the two, ________ is mandatory. A) MAC B) CSMA/CA+ACK C) RTS/CTS D) CSMA/CD

CSMA/CA+ACK

Which is one of the only two reliable protocols we have seen this term? A) IP B) CSMA/CA+ACK C) UDP D) 802.3

CSMA/CA+ACK

Which of the following is more efficient and faster? A) CSMA/CA+ACK B) RTS/CTS C) Both are about equally efficient and fast.

CSMA/CA+ACK

26) Credit card number thieves are called ________. (Pick the most precise answer.) A) numbers racketeers B) fraudsters C) identity thieves D) carders

D

43) In symmetric key encryption, a key must be ________ bits long, or longer, to be considered strong. (Choose the choice closest to the correct answer.) A) 36 B) 56 C) 64 D) 128

D

53) Passwords are widely used because they ________. A) are demanded by users B) offer strong authentication C) are the only authentication techniques known by most security professionals D) are inexpensive to use

D

6) The general name for a security flaw in a program is a ________. A) virus B) malware C) security fault D) vulnerability

D

65) In digital certificate authentication, the verifier gets the key it needs directly from the ________. A) supplicant B) verifier C) true party D) certificate authority

D

67) The digital certificate provides the ________. A) private key of the supplicant B) private key of the true party C) public key of the supplicant D) none of the above

D

79) ________ look at ________, and ________ look at ________. A) Antivirus programs, packets, firewalls, packets B) Antivirus programs, files, firewalls, files C) Antivirus programs, packets, firewalls, files D) Antivirus programs, files, firewalls, packets

D

80) In antivirus filtering, the best ways to filter currently use ________. A) application awareness B) stateful inspection C) signature detection D) behavioral detection

D

9) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) preinstallation B) stealth C) malware D) zero-day

D

Which of the following allows access point transmission two wireless clients simultaneously? A) CSMA/CA+ACK B) MIMO C) MU-MIMO D) none of the above

MU-MIMO

In 802.11i ________, hosts must know a shared initial key. A) 802.1X initial authentication mode B) PSK initial authentication mode C) both A and B D) neither A nor B

PSK initial authentication mode

To use an access point, you need to know its ________. A) SSID B) BSSID C) ESSID D) Wi-Fi ID

SSID

A ________ is an unauthorized internal access point. A) binky B) shadow C) rogue D) none of the above

rogue

Wireless access points typically link wireless clients to ________. A) wireless servers B) servers on the wired network C) both A and B

servers on the wired network

Wi-Fi operates in the 2.4GHz and 5GHz ________. A) frequencies B) spectrums C) channels D) service bands

service bands

An 802.11ac Wi-Fi compatibility testing profile contains ________ of the features of the 802.11ac. A) all B) nearly all C) some D) none

some

In CSMA/CD+ACK, when a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. When the traffic stops, it may transmit immediately. A) always true B) sometimes true C) always false

sometimes true

Signals in a transmission usually ________. A) travel at a single frequency B) spread over a range of frequencies C) spread over the entire frequency distribution D) spread over the entire service band

spread over a range of frequencies

Multipath interference is mitigated through ________. A) broadband transmission B) MIMO C) beamforming D) spread spectrum transmission

spread spectrum transmission

An access point can transmit to more than one wireless client at a time with ________. A) bonding B) MIMO C) Multiuser MIMO D) CSMC/CA+ACK

Multiuser MIMO

________ is a wireless network standard. A) OSI B) TCP/IP C) both A and B D) neither A nor B

OSI

A group of devices on a desk that communicate wirelessly is called a ________. A) LAN B) WAN C) MAN D) PAN

PAN

When a wireless client in an evil twin attack transmits, ________. A) the evil twin reads the packet, encrypts it, and passes on the packet B) the evil twin reads the frame, encrypts it, and passes on the frame C) the evil twin reads the packet and passes on the packet D) the evil twin reads the frame and passes on the frame

the evil twin reads the frame, encrypts it, and passes on the frame

In general, the fewer the channels, ________. A) the greater the likelihood of interference between access points B) the smaller the individual channels will be C) both A and B D) neither A nor B

the greater the likelihood of interference between access points

If an 802.11n client tries to use an 802.11ac access point, ________. A) they will not be able to communicate B) they will communicate using 802.11n C) they will communicate using 802.11ac D) either B or C

they will communicate using 802.11n

The main problem with the 60 GHz unlicensed band is that ________. A) it cannot be used outside B) it does not support MIMO C) transmission speed is low D) transmission distance is short

transmission distance is short

In 802.1x initial authentication mode, the authenticator is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above

wireless access point

If a signal has a strength of 100 mW at 10 meters, how strong will it be at 40 meters? A) about 0.5 mW B) about 5 mW C) about 25 mW D) about 6 mW

about 6mW

A rogue access point is usually created by ________. A) an employee B) an external attacker C) the IT security department D) an evil twin

an employee

In Bluetooth LE, ________ provide information. A) advertisements B) beacons C) both A and B D) neither A nor B

beacons

Beamforming can allow an access point to ________. A) focus power on individual clients B) send signals to two different clients at the same time C) both A and B D) neither A nor B

both A and B

Classic Bluetooth provides transmission speeds of ________. A) 3 Mbps B) 24 Mbps C) both A and B D) neither A nor B

both A and B

Individual throughput for users of an access point ________. A) depends on how many users are sharing the access point B) depends on your distance from the access point C) both A and B D) neither A nor B

both A and B

MIMO ________. A) increases transmission speed B) increases transmission distance C) both A and B D) neither A nor B

both A and B

Media access control governs transmission by ________. A) access points B) wireless hosts C) both A and B D) neither A nor B

both A and B

What initial authentication mode does 802.11i use? A) 802.1X B) PSK C) both A and B D) neither A nor B

both A and B

Which of the following is a risk in 802.11i PSK mode? A) Unauthorized sharing of the pre-shared key. B) A weak passphrase may be selected. C) both A and B D) neither A nor B

both A and B

Which of the following is true of Bluetooth? A) A master may have multiple slaves. B) A slave may have multiple masters. C) both A and B D) neither A nor B

both A and B

Which of the following uses OFDM? A) 802.11ac B) 802.11n C) both A and B D) neither A nor B

both A and B

To handle multiple conversations in 802.11 transmission, you normally use multiple ________. A) channels B) frequencies C) service bands D) wires

channels

If you want to transmit 7 times as fast in radio, you need to use ________. A) channels that are about 7 times as wide B) channels that are about 49 times as wide C) spread spectrum transmission D) none of the above

channels that are about 7 times as wide

After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) the preshared key B) an 802.1X key C) WPA keys D) different pairwise session keys

different pairwise session keys

If Wi-Fi supported the basic printing profile, ________. A) documents could be printed without downloading drivers B) printer drivers would be downloaded automatically C) printing would use two layers of drivers D) none of the above

documents could be printed without downloading drivers

Wider channel bandwidth ________. A) increases transmission speed B) allows more channels to be used in a service band C) both A and B D) neither A nor B

increases transmission speed

Two access points that operate on the same channel will ________. A) bond B) coordinate their use of the channel C) interfere D) divide the available spectrum about equally

interfere

The downside of unlicensed bands is potential ________ A) speed loss B) loss of flexibility C) interference from others D) less-developed standards

interference from others

If you triple channel bandwidth, what happens to the number of channels in a service band? A) It triples. B) It increases by a factor of nine. C) It is reduced a third. D) It is reduced a ninth.

it is reduced a third

Spread spectrum transmission is used in WLANs because ________. A) it is required by regulators B) it offers strong security C) both A and B D) neither A nor B

it is required by regulators

Selecting locations for access points first involves ________. A) laying out circles of a chosen diameter in a diagram of the building B) doing a wireless site survey C) selecting locations that reflect organizational units D) all of the above

laying out circles of a chosen diameter in a diagram of the building

The protection of communication between a wireless client and the access point is ________. A) link security B) end-to-end security C) both A and B D) neither A nor B

link security

IoT transmissions usually involve ________. A) high transmission speeds B) low transmission distances C) both A and B D) neither A nor B

low transmission distances

Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band. A) more bandwidth B) less absorptive attenuation C) both A and B D) neither A nor B

more bandwidth

Spread spectrum transmission is used in WLANs for ________. A) higher transmission speed B) more reliable transmission C) greater security D) more efficient transmission

more reliable transmission

In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server

access point

If another wireless device is near, but in an unknown direction, it is better to use ________. A) an omnidirectional antenna B) a dish antenna C) neither A nor B

an omnidirectional antenna

The term "broadband" is commonly used for ________. A) wide radio bandwidths B) high-speed transmission in general C) both A and B D) neither A nor B

both A and B

Which of the following is true of 802.11ay over 802.11ad? A) greater propagation speed B) greater propagation distance C) both A and B D) neither A nor B

both A and B

The 60 GHz unlicensed service band offers ________ compared to lower-frequency service bands. A) more speed per channel B) greater propagation distance C) greater ability to penetrate walls D) all of the above

more speed per channel

Wireless radio transmission speed is usually measured in terms of ________. A) wavelength B) frequency C) amplitude D) dollars

frequency

For a game joystick, you would use the ________ Bluetooth profile. A) basic printing B) SYNCH C) human interface device D) mouse

human interface device

MIMO ________. A) increases throughput B) lowers propagation distance C) both A and B D) neither A nor B

increases throughput

When a receiver transmits an ACK, ________. A) it must use CSMA/CA B) it must use CSMA C) in must use CA D) it must transmit immediately

it must transmit immediately

In an extended service set, each access point ________. A) must have the same SSID B) must have a different SSID C) must have a coordinated SSID D) none of the above

must have the same SSID

In 802.1x initial authentication mode, the VERIFIER is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above

none of the above

In VPNs designed to frustrate evil twin attacks, the shared secret between the client and the server is ________. A) transmitted in the clear B) transmitted with cryptographic protections C) not transmitted D) any of the above

not transmitted

What propagation problem becomes worse when there is a large, and dense, object between sender and receiver? A) multipath interference B) shadow zones (dead zones) C) inverse square law attenuation D) none of the above

shadow zones (dead zones)

If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________. A) still protected by a firewall B) still protected by encryption C) both A and B D) neither A nor B

neither A nor B

What propagation problem becomes worse as frequency increases? A) inverse square law attenuation B) electromagnetic interference C) both A and B D) neither A nor B

neither A nor B

Which initial authentication mode is used for message-by-message encryption, authentication, and message integrity? A) 802.1X B) PSK C) both A and B D) neither A nor B

neither A nor B

An 8/1 increase in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 20 D) none of the above

none of the above

MIMO ________. A) bonds two or more channels for higher speed B) is used in all forms of 802.11 C) uses a single spatial stream but multiple signals D) transmits multiple signals in the same channel

transmits multiple signals in the same channel

In Wi-Fi, 2.4 GHz and 5 GHz refer to ________. A) frequency spectrums B) broadbands C) channels D) none of the above.

none of the above

When does it make sense to use RTS/CTS? A) when all devices can hear each other B) when not all of the devices can hear each other C) when efficiency is crucial D) always

when not all of the devices can hear each other

To transmit very rapidly in radio, you need ________. A) single-frequency transmission B) single-mode transmission C) wide bandwidth D) narrow bandwidth

wide bandwidth

Passive RFID chips get the power needed to transmit from ________. A) wall power B) coin batteries C) the electricity that always flows through the air in small quantities D) none of the above

none of the above

The set of frequencies used for police communication in a city are ________. A) channels B) frequencies C) spectrums D) none of the above

none of the above

What is the bandwidth of a channel that extends from 55 MHz to 60 MHz? A) 60 MHz B) 55 MHz C) 65 MHz D) none of the above

none of the above

Which is the correct formula for decibels? A) 10 * P2/P1 B) 10 * (P2/P1)2 C) Log10(P2/P1) D) none of the above

none of the above

A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? A) 1 B) 2 C) 4 D) There will be one frame for each switch along the way.

2

A change in power from 2 mW to 205 mW corresponds to approximately ________ decibels. A) 3 B) 9 C) 10 D) 20

20

The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s). A) 1 B) 3 C) 7 D) 11

3

Compared to an omnidirectional antenna, a dish antenna quadruples radiated power. How much is this change in decibels? A) 6 dB B) 9 db C) 16 db D) none of the above

6 dB

Wi-Fi normally uses a(n) ________. A) omnidirectional antenna B) dish antenna C) both A and B D) neither A nor B

omnidirectional antenna

Wi-Fi Standards come from the ________ Working Group. A) 802.1 B) 802.3 C) 802.11 D) 802.1X

802.11

Today, Wi-Fi sales are dominated by ________. A) 802.11a B) 802.11g C) 802.11n D) 802.11ac

802.11ac

________ is among the most widely used 802.11 transmission standards used today. A) 802.11g B) 802.11ac C) both A and B D) neither A nor B

802.11ac

Which of the following works in the 60 GHz unlicensed service band? A) 802.11ac B) 802.11ad C) 802.11ax D) all of the above

802.11ad

What is the strongest security protocol for 802.11 today? A) 802.11s B) 802.11X C) WPA D) 802.11i

802.11i

73) ACLs are used for packets in the ________ state. A) connection-opening B) ongoing communication C) both A and B D) neither A nor B

A

Compared to wired transmission, propagation problems in radio transmissions are ________. A) worse B) about as bad C) better

worse

62) Iris scanning is attractive because of its ________. A) low cost B) precision C) both A and B D) neither A nor B

B

A change in power from 100 W to 1 W corresponds to approximately ________ decibels. A) 10 B) 20 C) -10 D) -20

-20

If there is an access point that serves eight wireless hosts, on how many channels will these devices transmit and receive during the course of an hour or two? A) 1 B) 2 C) 8 D) 9

1

16) In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 8 B) 12 C) 20 D) 128

20

15) Mobile code is another name for ________. A) virus B) worm C) both A and B D) neither A nor B

D

A single access point, and the set of hosts it serves, is called a(n) ________. A) BSS B) BSSID C) ESS D) none of the above

BSS

In roaming, a wireless client moves from one ________ to another without losing its connection. A) ESS B) BSS C) SSID D) none of the above

BSS

A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile. A) classic Bluetooth B) Bluetooth LE C) both A and B D) neither A nor B

Bluetooth LE

31) Methods that hackers use to break into computers are ________. A) cracks B) magics C) exploits D) compromises

C

34) In distributed DoS attacks, the attacker sends messages directly to ________. A) bots B) the intended victim of the DoS attack C) a command and control server D) DOS servers

C

38) Who are the most dangerous types of employees? A) financial employees B) manufacturing employees C) IT security employees D) former employees

C

54) A user picks the password "tiger." This is likely to be cracked quickly by a(n) ________. A) attack on an application running as root B) brute-force attack C) dictionary attack D) reverse engineering attack

C

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs B) VPNs C) 802.1X mode D) none of the above

VPNs

If a signal has a strength of 100 mW at 10 meters, how strong will it be at 100 meters? A) about 10 mW B) about 1 mW C) about 0.1 D) none of the above

about 0.1

If the signal strength from an omnidirectional radio source is 100 mW at 10 meters, how strong will it be at 30 meters, ignoring absorptive attenuation? A) about 30 mW B) about 11 mW C) about 4 mW D) about 0.1 mW

about 11 mW

What propagation problem is especially bad in moist air? A) absorptive attenuation B) electromagnetic interference C) multipath interference D) inverse square law attenuation

absorptive attenuation

In Bluetooth LE, ________ notify other Bluetooth devices that it is available. A) advertisements B) beacons C) both A and B D) neither A nor B

advertisements

Bluetooth LE ________. A) uses about 0.1 to 0.5 watts B) assumes that transmissions will be infrequent C) has terse connection openings D) all of the above

all of the above

You should use a VPN ________. A) if you know that an evil twin access point is in use. B) if you know that your device has been compromised by an evil twin attack. C) always D) never

always

Wi-Fi standards use unlicensed bands for ________ A) greater speed B) greater standardization C) greater flexibility D) greater privacy

greater flexibility

NFC transmission standards have been set for ________. A) its service band B) mesh networking C) both A and B D) neither A nor B

its service band

Centralized access point management ________. A) increases management costs but provides better control B) reduces management costs

reduces management costs

802.11i PSK initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points

residences with a single access point

Access points in the same ESS communicate via ________. A) wireless transmission B) the distribution system C) a master access point D) routers

the distribution system

The frequency spectrum extends ________. A) into the gigahertz range B) into the visible light range C) into the ultraviolet range D) to infinity

to infinity

If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s). A) one B) two C) four D) none of the above.

two

Many 802.11 standards work in the 5 GHz_____. A) licensed spectrum B) unlicensed spectrum C) licensed service band D) unlicensed service band

unlicensed service band


Ensembles d'études connexes

Chapter 8-Health Insurance Basics

View Set

A+ COMPTIA Final Exam Study Guide

View Set

Chapter 9 - Corporate Valuation and Financial Planning Fin 365

View Set