Filters
Question type

Study Flashcards

What is WAP?


A) It is a protocol used by laptop computers for wireless communication.
B) It is used primarily to encrypt wired communications,but can be used for wireless as well.
C) It is another name for 802.11g.
D) It is a protocol used by cellular phones to deliver e-mail and lightweight web services.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

______________ means reliable information.


A) Integrity
B) Confidentiality
C) Authentication
D) WTLS

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Why is wireless problematic from a security standpoint?


A) There is no control over physical limitations.
B) Insufficient signal strength
C) There is no control over the physical layer of traffic.
D) There is no control over the network.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set.


A) Bluejacking
B) Bluesnarfing
C) Bluebugging
D) Bluehacking

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Alert messages in Wireless Transport Layer Security (WTLS)are sometimes sent in plaintext and are not authenticated.

A) True
B) False

Correct Answer

verifed

verified

WAP uses _______________ for its encryption scheme.


A) WEP
B) SSL
C) WTLS
D) ElGamal

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following protocols was designed for short-range wireless communication typically with mobile phones?


A) WPA2
B) Bluetooth
C) WEP
D) 802.11n

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Discuss 802.11 security issues and possible solutions.

Correct Answer

verifed

verified

802.11 does not allow physical control o...

View Answer

In _______________,instead of sending an unsolicited message to the victim's phone,the attacker copies off the victim's information,which can include e-mails or contact lists.

Correct Answer

verifed

verified

_______________ is a modulation type that spreads the traffic sent over the entire bandwidth.

Correct Answer

verifed

verified

Direct-seq...

View Answer

Because the security of wireless LANs is ineffective,many users have switched to a layered security approach.

A) True
B) False

Correct Answer

verifed

verified

802.11 is the IEEE standard for wireless local area networks and includes the following:


A) a,b,c,g
B) n,g,c
C) a,b,g,n
D) b,g,n

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

With any wireless protocol,which of the following are true?


A) Extra care should be taken to ensure that the security of the protocol is not compromised.
B) A WAP gateway should be created.
C) Encryption standards should be random.
D) RSA encryption should be used.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

The most common frequency band used in the household is 4.2 GHz.

A) True
B) False

Correct Answer

verifed

verified

______________ is the process by which each end of the data flow proves that they are who they say they are.


A) Integrity
B) Confidentiality
C) Authentication
D) WTLS

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_______________ multiplexes or separates the data to be transmitted into smaller chunks and then transmits the chunks on several sub channels.

Correct Answer

verifed

verified

Orthogonal...

View Answer

_______________ is a term used for the act of sending an unauthorized message to another Bluetooth device.

Correct Answer

verifed

verified

_______________ started with people using chalk on sidewalks to mark some of the wireless networks they found.

Correct Answer

verifed

verified

Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails,contact lists,calendars,photos,and videos.

A) True
B) False

Correct Answer

verifed

verified

Which of the following specifications of 802.11 has the highest speed?


A) g
B) n
C) i
D) s

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 43

Related Exams

Show Answer