Show:
Questions
Responses
Print
Key Terms
Review Questions
Review Questions Part 2
Review Questions Part 3
Key Terms Part Two
100
The encryption protocol standard for WPA2
What is AES-CCMP
100
The name of Chapter 8
What is Wireless Network Security
100
A bluetooth network that contains one master and at least one slave using the same RF channels forms this
What is a piconet
100
Bluetooth falls under the category of this network
What is Personal Area Network (PAN)
100
An attack that sends unsolicited messages to Bluetooth-enabled devices.
What is Blue-Jacking
200
Searching for wireless signals from an automobile or on foot using a portable computing device
What is War Driving
200
WPA replaced WEP wiith this protocol
What is Temporal Key Integrity Protocol or TKIP
200
This cannot be a type of wirless AP probe
What is a WNIC Probe
200
The unauthorized access of information from a wireless device through a Bluetooth connections
What is Blue-Snarfing
200
An AP set up by an attacker to mimic an authorized AP and capture transmissions
What is a Evil Twin
300
The transmission of the SSID from the access point to wireless devices
What is SSID Broadcast
300
A wireless technology that uses a short-range radio frequency
What is Bluetooth
300
Which technology do professionals recommend to use instead of LEAP
What is PEAP
300
A method for controlling access to a WLAN based on the device's MAC address.
What is Media Access Control (MAC) address filtering
400
A WPA encryption technology
What is Temporal Key Integrity Protocol or (TKIP)
400
An AP set up by a employee without the employers permission
What is a Rouge Access Point
400
This is the most flexible approach for separating packets in a wireless VLAN
What is an AP or Access Point
400
Not a requirement for War Driving
What is a GPS Receiver
400
An EAP method designed to simplyfy the deployment of 802.1x by using Microsoft Windows logins and passwords
What is Protected EAP (PEAP)
500
The second generation of WPA security from the Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs
What is Wi-Fi Protected Access 2 or (WPA2)
500
a security protocol that uses a TKIP encryption and has a medium security level
What is WPA
500
the primary "Weakness" of the use of WEP
What is a Detectable Pattern
500
The following is not a advantage of IEEE 802.11n
What is a smaller coverage area
500
The process of documenting then advertising the location of wireless LANs for others to use.
What is War Chalking