Matching
-An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)
Correct Answer:
Verified
Q17: An access point that is unauthorized and
Q23: Matching
-The authentication model used in WPA that
Q24: On a piconet, slave devices that are
Q25: Which of the following choices is not
Q26: How can an administrator force wireless clients
Q27: Matching
-An IEEE 802.11 security protocol designed to
Q29: Matching
-An optional means of configuring security on
Q30: Matching
-Intentionally flooding the radio frequency (RF) spectrum
Q31: Matching
-A 24-bit value used in WEP that
Q32: When a wireless device looks for beacon
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents