Filters
Question type

Study Flashcards

The current Bluetooth version is Bluetooth 6.

A) True
B) False

Correct Answer

verifed

verified

What type of survey can help a network administrator make decisions about bands,channels,and widths when installing new access points?


A) wireless
B) site
C) frequency
D) architectural

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Discuss how to prevent bluesnarfing.

Correct Answer

verifed

verified

To prevent bluesnarfing,Bluetooth device...

View Answer

Which of the following choices is not one of the four types of packets used by EAP?


A) Request
B) Response
C) Success
D) Error

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

RFID is commonly used to transmit information between networked computers.

A) True
B) False

Correct Answer

verifed

verified

What specific feature on an AP controls how much of the spectrum is available to transfer data?


A) channel width
B) channel variance
C) channel selection
D) channel frequency limit

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Where does the supplicant send identity information?


A) client
B) second supplicant
C) authenticator
D) certificate authority

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Discuss the different types of interference one might encounter using wireless devices.

Correct Answer

verifed

verified

Because wireless devices operate using R...

View Answer

What is the Message Integrity Check (MIC)within WPA used for?

Correct Answer

verifed

verified

The Message Integrity Check (M...

View Answer

What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?

Correct Answer

verifed

verified

An attacker can use ...

View Answer

The MAC address is a unique 64-bit number that is "burned" into the network interface card adapter when it is manufactured.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the most secure form of IEEE 802.1x authentication?


A) approved authentication
B) authenticator-based authentication
C) spectrum-based authentication
D) certificate-based authentication

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Wired Equivalent Privacy (WEP)is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.

A) True
B) False

Correct Answer

verifed

verified

What is the maximum number of characters that can exist within a SSID name?


A) 10
B) 12
C) 26
D) 32

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the maximum transmission power for IEEE WLANs?


A) 100 milliwatts (mW)
B) 200 milliwatts (mW)
C) 400 milliwatts (mW)
D) 500 milliwatts (mW)

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

When using AES-CCMP,the AES-256 bit key requires how many rounds?


A) 4
B) 10
C) 13
D) 15

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

What is the maximum range of most Bluetooth 5 devices?


A) 200 ft
B) 60 meters
C) 150 meters
D) 800 ft

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Near field communication (NFC)is a set of standards used to establish communication between devices in very close proximity.

A) True
B) False

Correct Answer

verifed

verified

What type of radio frequency transmissions are used by Bluetooth devices?


A) single-range radio
B) long-range radio
C) short-range radio
D) ultra-short-range radio

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Select the device that is designed to exclusively monitor the RF frequency for network transmissions?


A) access point probe
B) dedicated probe
C) WAP
D) wireless device probe

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer