A) It is a protocol used by laptop computers for wireless communication.
B) It is used primarily to encrypt wired communications,but can be used for wireless as well.
C) It is another name for 802.11g.
D) It is a protocol used by cellular phones to deliver e-mail and lightweight web services.
Correct Answer
verified
Multiple Choice
A) Integrity
B) Confidentiality
C) Authentication
D) WTLS
Correct Answer
verified
Multiple Choice
A) There is no control over physical limitations.
B) Insufficient signal strength
C) There is no control over the physical layer of traffic.
D) There is no control over the network.
Correct Answer
verified
Multiple Choice
A) Bluejacking
B) Bluesnarfing
C) Bluebugging
D) Bluehacking
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) WEP
B) SSL
C) WTLS
D) ElGamal
Correct Answer
verified
Multiple Choice
A) WPA2
B) Bluetooth
C) WEP
D) 802.11n
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) a,b,c,g
B) n,g,c
C) a,b,g,n
D) b,g,n
Correct Answer
verified
Multiple Choice
A) Extra care should be taken to ensure that the security of the protocol is not compromised.
B) A WAP gateway should be created.
C) Encryption standards should be random.
D) RSA encryption should be used.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Integrity
B) Confidentiality
C) Authentication
D) WTLS
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) g
B) n
C) i
D) s
Correct Answer
verified
Showing 21 - 40 of 43
Related Exams