Chapter 12
1. What is wireless networking?
A. The transmission of packetized data by means of fiber optic cable
B. The transmission of packetized data via the internet
C. The transmission of packetized data by means of physical topology not using direct physical links
D. The transmission of packetized data by means of private bands
2. Why is wireless problematic from a security standpoint?
A. There is no control over physical limitations.
B. Insufficient signal strength
C. There is no control over the physical layer of traffic.
D. There is no control over the network.
3. WTLS implements integrity through the use of __________.
A. DES
B. 3DES
C. MACs
D. DACs
4. The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.
A. integrity
B. confidentiality
C. authentication
D. WTLS
5. Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?
A. Orthogonal frequency division band (OFDB)
B. Direct-sequence spread spectrum (DSSS)
C. Near field communication (NFC)
D. 802.11i
6. One standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is __________.
A. WAP
B. WTLS
C. 802.11b
D. 804.11b
7. Which network security standard was created to provide users with an easy method of configuring wireless networks?
A. Wireless Transport Layer Security (WTLS)
B. Wi-Fi Protected Setup (WPS)
C. Protected EAP (PEAP)
D. Wireless Application Protocol (WAP)
8. Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?
A. Evil twin
B. Denial of service
C. Replay
D. Man-in-the-middle
9. An attacker who uses Bluetooth to copy emails, contact lists, or other files on a device is __________.
A. Bluejacking
B. Bluesnarfing
C. Bluebugging
D. Bluehacking
10. Which term refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations?
A. Jailbreaking
B. Segmentation
C. BYOD
D. Off-boarding
TRUE / FALSE
11. ZigBee is a low-power, personal area networking technology described by the IEEE 802.15.4 series.
12. Alert messages in Wireless Transport Layer Security (WTLS) are sometimes sent in plaintext and not authenticated.
13. The primary reason that spread-spectrum technology is used in 802.11 protocols is to provide security.
14. EAP is a framework to secure the authentication process.
Answer & Explanation
Solved by verified expert
- molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. D
- facilisis. Pellentesque dapibus efficitur laoreet. Nam ri
- icitur
- nec facilisis. Pe
- nec facilisis. Pellentesque dapi
- onec aliqu
- s ante, dapibus a molestie co
- s ante, d
- ipiscing elit.
- rem ipsum dolo
- cing
- cing
- pulv
- ur l
Unlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answer
Step-by-step explanation
- a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec
- ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvina
- or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus
- facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat,
- cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. N
- a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur
- pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam r
- e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec fac
- icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fu
- et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam ri
- Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit a
- onec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pell
- cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapi
- ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consect
a molestie
e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ips
amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis.
fficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel lao
iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet.
e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ips
a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adi
nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibu
ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lore
icitur laoreet. Nam risus ante, dapibus a molestie consequat, ul
et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet.