CIS 321 Quiz 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the strongest security protocol for 802.11 today?

802.11i

A security might use SNMP Get commands to ________ and SNMP Set commands to _______.

collect information to look for a rogue access point, change an access point's power

Bluetooth uses ________ operation.

one-to-one

Wi-Fi direct ________ uses access points.

never

Site surveys should be done ________. A. after the initial provisional placement of access points B. periodically afterwards C. both A and B D. neither A nor B

C. both A and B

What initial authentication mode does 802.11i use? A. 802.1X B. PSK C. both A and B D. neither A nor B

C. both A and B

Which of the following is a risk in 802.11i PSK mode? A. Unauthorized sharing of the pre-shared key. B. A weak passphrase may be selected. C. both A and B D. neither A nor B

C. both A and B

Which of the following is an ad hoc networking protocol? A. Zigbee B. Z-Wave C. both A and B D. neither A nor B

C. both A and B

A group of devices on a desk that communicate wirelessly is called a ________.

PAN

When two devices communicate using NFC, how close must they be?

a few inches

In 802.11i, protection, confidentiality, and message integrity are provided between the client and the ________.

access point

Which of the following is usually set up by a hacker outside the building?

an evil twin access point

In Bluetooth LE, ________ provide information.

beacons

If Wi-Fi supported the basic printing profile, ________.

documents could be printed without downloading drivers

A VPN provides ________.

end-to-end security

IoT transmissions usually involve ________.

low transmission distances

802.11i PSK initial authentication mode was created for ________ and 802.11i 802.1X initial authentication mode was created for ________.

residences with a single access point, corporations with multiple access points

A ________ is an unauthorized internal access point.

rogue

Passive RFID chips get the power needed to transmit from ________.

the electricity that always flows through the air in small quantities

In 802.1x initial authentication mode, the authenticator is the ________.

wireless access point


Set pelajaran terkait

Accounting 1B Chapter 10 - Fixed Assets and Intangible Assets

View Set

Where is DNA located inside of a eukaryotic cell?

View Set

10.4 Parallel and Perpendicular Lines

View Set

Art 111 inquizutive 1.6 - 3.10 WIP

View Set