hw 7

Ace your homework & exams now with Quizwiz!

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

VPNs

A security might use SNMP Get commands to ________.

collect information to look for a rogue access point

802.11i 802.1X initial authentication mode was created for ________.

corporations with multiple access points

A security might use SNMP Set commands to ________.

change an access point's power

A change in power from 100 W to 1 W corresponds to approximately ________ decibels.

-20

A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile.

Bluetooth LE

A lamp in a Zigbee network would probably be a ________.

None of these

A group of devices on a desk that communicate wirelessly is called a ________.

PAN

An evil twin access point is usually ________.

a laptop computer

A rogue access point is usually created by ________.

an employee

802.11i provides ________.

both confidentiality and message integrity

A VPN provides ________.

end-to-end security

802.11i can defeat rogue access points.

false

802.11i PSK initial authentication mode was created for ________.

residences with a single access point

A ________ is an unauthorized internal access point.

rogue


Related study sets

Chapter 34 Obstetrics and Neonatal Care

View Set

7th grade geography chapter 7 South America

View Set

Chapter 34 Obstetrics and Neonatal Care

View Set

ADAMS INTERNATIONAL SCHOOL. HISTORY STUDY GUIDE FOR WEEK #18 MID-TERM EXAM

View Set