Matching
-An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information, but is not considered secure due to significant vulnerabilities.
A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)
Correct Answer:
Verified
Q17: An access point that is unauthorized and
Q23: Matching
-The authentication model used in WPA that
Q24: On a piconet, slave devices that are
Q26: How can an administrator force wireless clients
Q28: Matching
-An attack that accesses unauthorized information from
Q29: Matching
-An optional means of configuring security on
Q30: Matching
-Intentionally flooding the radio frequency (RF) spectrum
Q31: Matching
-A 24-bit value used in WEP that
Q32: When a wireless device looks for beacon
Q34: When using AES-CCMP,the AES-256 bit key requires
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents