Wireless chpt 11 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

_____ is simply a MIB module that defines a set of objects that are used by the hardware probes that permit advanced network management capabilities. a. Remote Network Monitoring (RMON) b. Simple Network Management Protocol (SNMP) c. Radius d. VRK-Packet Analysis

a

What is a collection of suggestions that should be implemented? a. policy b. guideline c. standard d. code

b

What is the purpose of phishing? a. to persuade the user to distribute the spam b. to trick the user into surrendering private information c. to ask user to contact friends d. to influence the user to purchase a product

b

A lock that extends a solid metal bar into the door frame for extra security is the _____. a. deadman's lock b. full bar lock c. deadbolt lock d. triple bar lock

c

By definition a(n) _____ is a person or thing that has the power to carry out a threat. a. vulnerability b. exploit c. threat agent d. risk

c

The residential lock most often used for keeping out intruders is the _____. a. privacy lock b. passage lock c. keyed entry lock d. encrypted key lock

c

Which of the following is not an approach to trust? a. trust all people all the time b. trust everybody all of the time c. trust authorized individuals only d. trust some people some of the time

c

Each of the following is a step in a vulnerability assessment except _____. a. asset identification b. vulnerability appraisal c. risk mitigation d. risk avoidance

d

Which of the following is a social engineering technique that uses flattery on a victim? a. conformity b. friendliness c. fear d. ingratiation

d

Which of the following is not a drawback to relying only on device and AP tools for monitoring the WLAN? a. acquiring data from each AP and each wireless device across the network can be a labor- and time intensive task. b. unless a person is constantly monitoring this data it cannot be use to warn of an impending wireless issue. c. data gather from the AP and devices is collected in real time but often organization lack the facility to store a large repository of data. d. devices and AP monitoring tools are very expensive to purchase,

d

Which policy defines the actions users may perform while accessing systems and networking equipment? a. end user policy b. internet user policy c. user permission policy d. acceptable use policy

d

Which of the following would not be found in a password management and complexity policy? a. do not use alphabetic characters. b. do not use passwords that is a word found in the dictionary. c. do not use the name of a pet d. do not use personally identifiable information

a

Which of the following is not a characteristic of a policy? a. policies communicate a unanimous agreement of judgement b. policies may be helpful in the event that it is necessary to prosecute violators. c. policies identify what tools and procedures are needed. d. policies define appropriate user behavior.

a

Which of the following is not data provided by enterprise-level APs? a. signal strength to one specific client b. event log c. statistics on wireless transmissions d. statistics on wired transmissions

a

A _____ can be used to secure a mobile device. a. cable lock b. mobile chain c. security tab d. mobile connector

a

Each of the following is an option when dealing with risk except _____. a. preventing the risk b. accepting the risk c. diminishing the risk d. Transfering the risk

a

Each of these occasions is an opportunity for security education and training except _____. a. after an employee is terminated b. after a computer attack has occurred c. during an annual department retreat d. when a new user hardware or software is install

a

For adult learners a(n) _____ approach (the art of helping an adult learn) is often preferred. a. andragogical b. institutional c. proactive d. pedagogical

a

What is the primary purpose of a wireless security policy? a. it specifies the conditions that wireless devices must satisfy in order to connect to the organization's network. b. it requires that all mobile devices use a specific operation system. c. it request that user implement WPA. d. it outlines the length and strength of passwords.

a

Which of the following cannot be used along with fencing as a security perimeter? a. vapor barrier b. rotating spikes c. roller barrier d. anti-climb paint

a


Set pelajaran terkait

Chapter 4-Validating an Documenting Data

View Set

Porth's Ch 20 Disorders of Brain Function

View Set

Nutrition McGraw Hill Questions Test 2

View Set