week 5 security management, computer science homework help

User Generated

navxrgcngry

Computer Science

Description

Please answer the questions on the attached document.

Week 5 Assigment.pdfView in a new window

Unformatted Attachment Preview

1. Bluetooth falls under the category of . a. local area network (LAN) b. short area network (SAN) c. paired-device network (PDN) d. personal area network (PAN) 2. A Bluetooth network that contains one master and at least one slave using the same RF channel forms a . cluster grouping scatteringnet piconet is the unauthorized access of information from a wireless device through a Bluetooth connection. a. Bluejacking b. Bluetooth snatching c. Bluetooth spoofing d. Bluesnarfing The IEEE standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum. a. 802.11 b. 802.11a c. 802.11b d. 802.11g Each of the following is an advantage of IEEE 802.11n except . a. smaller coverage area b. faster speed c. less interference d. stronger security Which of the following is not found in a residential WLAN gateway? a. intrusion detection system (IDS) b. firewall c. router d. dynamic host configuration protocol (DHCP) a. b. c. d. 3. 4. 5. 6. 7. Which of the following is not a requirement for war driving? a. Wireless NIC adapter b. antennas c. GPS receiver d. mobile computer device 8. The primary design of a(n) is to capture the transmissions from legitimate users. evil twin Bluetooth grabber WEP rogue access point 9. Which of the following is a vulnerability of MAC address filtering? a. The user must enter the MAC. b. APs use IP addresses instead of MACs. c. Not all operating systems support MACs. d. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. 10. Each of the following is a limitation of turning off the SSID broadcast from an AP except . a. the SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP b. turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another c. some versions of operating systems favor a network broadcasting an SSID over one that does not d. users can more easily roam from one WLAN to another 11. The primary weakness of wired equivalent privacy (WEP) is . a. its usage creates a detectable pattern b. initialization vectors (IVs) are difficult for users to manage c. it only functions on specific brands of APs d. it slows down a WLAN from 104 Mbps to 16 Mbps a. b. c. d. 12. The two models for personal wireless security developed by the Wi-Fi Alliance are Wi-Fi Protected Access (WPA) and . Protected Wireless Security (WPS) IEEE 802.11ai Postshared Key Protection (PKP) Wi-Fi Protected Access 2 (WPA2) WPA replaces WEP with . a. Temporal Key Integrity Protocol (TKIP) b. Cyclic Redundancy Check (CRC) c. Message Integrity Check (MIC) d. WPA2 A preshared key (PSK) of fewer than characters may be subject to an attack if that key is a common dictionary word. a. 6 b. 12 c. 16 d. 20 A WEP key that is 128 bits in length . a. cannot be used on access points that use passphrases. b. is less secure than a WEP key of 64 bits because shorter keys are stronger. c. has an initialization vector (IV) that is the same length as a WEP key of 64 bits. d. cannot be cracked because it is too long. AES-CCMP is the encryption protocol standard used in . a. WPA2 b. IEEE 802.11 c. WPA d. Bluetooth What is the Extensible Authentication Protocol (EAP)? a. A subset of WPA2 b. The protocol used in TCP/IP for authentication c. A framework for transporting authentication protocols d. A technology used by IEEE 802.11 for encryption a. b. c. d. 13. 14. 15. 16. 17. 18. Which technology should be used instead of LEAP? a. STREAK b. LEAP-2 c. REAP d. PEAP 19. Each of the following is a type of wireless AP probe except . a. wireless device probe b. dedicated probe c. AP probe d. WNIC probe 20. The most flexible approach for a wireless VLAN is to have which device separate the packets? a. firewall b. AP c. NIC d. router
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go :)

1.

2.

3.

4.

5.

6.

Bluetooth falls under the category of
.
a. local area network (LAN)
b. short area network (SAN)
c. paired-device network (PDN)
d. personal area network (PAN)
A Bluetooth network that contains one master and at least one
slave using the same RF channel forms a
.
a. cluster
b. grouping
c. scatteringnet
d. piconet
is the unauthorized access of information from a wireless device
through a Bluetooth connection.
a. Bluejacking
b. Bluetooth snatching
c. Bluetooth spoofing
d. Bluesnarfing
The IEEE
standard specifies a maximum rated speed of
54 Mbps using the 5 GHz spectrum.
a. 802.11
b. 802.11a
c. 802.11b
d. 802.11g
Each of the following is an advantage of IEEE 802.11n except
.
a. smaller coverage area
b. faster speed
c. less interference
...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags