Security+ Chapter 8 Answers
Security+ Chapter 8 Answers
Security+ Chapter 8 Answers
2. A bluetooth network that contains one master and one slave using the same RF channel forms a _____________? D Piconet 3. ___________ is the unauthorized access of information from a wireless device through a bluetooth connection. D - Blue-snarfing
4. The IEEE _____________ standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum? B - 802.11a
5. Each of the following is an advantage of IEEE 802.1n except __________? A Smaller coverage area
8. The primary design of a ___________ is to capture the transmissions from legitimate users? A Evil Twin
9. Which of the following is a vulnerability of MAC address filtering? D MAC address are exchanged initially in unencrypted format.
10. Each of the following is a limitation of turning off the SSID broadcast from an AP except_________? D Users can more easily roam from one WLAN to another.
11. The primary weakness of Wired Equivalency privacy (WEP) is ____________? A Its usage creates a detectable pattern.
12. The two models for personal wireless security developed by the WiFi Alliance are WI-Fi Protected Access (WPA) and ___________? D - WPA2
14. A preshared key (PSK) of fewer than _________ characters may be subject to an attack if that key is a common dictionary word? D - 20
15. A WEP key length that is 128 bits in length _________? C IV the same as a WEP key of 64 bits
17. What is the Extensible Authentication Protocol (EAP)? C A framework for transporting authentication protocols
19. Each of the following is a type of wireless AP probe except? D WNIC probe
20. The most flexible approach for a wireless VLAN is to have which device separate the packets? B - AP