Bluetooth is an example of what type of technology below?

Small Area Network
Private Area Network
Personal Area Network
Limited Area Network

Personal Area Network
What is the maximum range of most Bluetooth devices?

10 ft
18 meters
15 meters
33 ft

33 ft
The IEEE 802.15.1-2005 standard is based on what version of the Bluetooth specifications?

Bluetooth v2.1
Bluetooth v1.2
Bluetooth v 1.0
Bluetooth v 1.1

Bluetooth v1.2
Slave devices that are connected to a piconet and are sending transmissions are known as what?

Active slave
Passive slaves
Hybrid drones
Neutral drones

Active slave
Piconets in which connections exist between different piconets are known as a:

broadnet
honeynet
boundnet
scatternet

scatternet
What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

Bluesnarfing
Bluejacking
Bluecracking
Bluetalking

Bluejacking
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as?

Bluejacking
Bluecracking
Bluesnarfing
Bluetalking

Bluesnarfing
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?

Access Point
Endpoint
WMM
Ad-hoc peer

Access Point
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

random
sanctioned
rogue
legitimate

rogue
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

active twin
authorized twin
internal replica
evil twin

evil twin
What is the maximum number of characters that can exist within an SSID name?

10
12
26
32

32
The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length?

24 bits
32 bits
48 bits
64 bits

48 bits
Which encryption protocol below is used in the WPA2 standard?

AES-CCMP
AES-CTR
AES-TKIP
AES-SCMP

AES-CCMP
Which of the following choices is not one of the four types of packets used by EAP?

Request
Response
Success
Error

Error
Which option below is responsible for the issuing of EAP request packets?

supplicant
authenticator
authentication server
proxy

authenticator
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS:

EAP-MSCHAPv2
EAP-AKA
EAP-FAST
EAP-SIM

EAP-FAST
What proprietary EAP method developed by Cisco requires mutual authentication for WLAN encryption using Cisco client software?

LEAP
TKIP
EAP
PEAP

LEAP
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords?

TKIP
LEAP
PEAP
ICMP

PEAP
How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agree to a use policy or present valid login credentials?

Gateway access point
Captive portal access point
Wireless device probe
AUP Enforcement access point

Captive portal access point
When using AES-CCMP, the AES-256 bit key requires how many rounds?

4
10
13
15

13
x

Hi!
I'm Niki!

Would you like to get a custom essay? How about receiving a customized one?

Check it out