Question
I want answer this Q, please 11. Which of these is a vulnerability of MAC address filtering? a. APs use IP addresses instead of MACs.
I want answer this Q, please
11. Which of these is a vulnerability of MAC address filtering?
a. APs use IP addresses instead of MACs.
b. The user must enter the MAC.
c. MAC addresses are initially exchanged unencrypted.
d. Not all operating systems support MACs.
12. Which of these is NOT a limitation of turning off the SSID broadcast from an AP?
a. Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.
b. Some versions of operating systems favor a network that broadcasts an SSID over one that does not. c. Users can more easily roam from one WLAN to another.
d. The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.
13. What is the primary weakness of wired equivalent privacy (WEP)?
a. It functions only on specific brands of APs.
b. Its usage creates a detectable pattern.
c. It slows down a WLAN from 104 Mbps to 16 Mbps.
d. Initialization vectors (IVs) are difficult for users to manage.
14. WPA replaces WEP with _____.
a. WPA2
b. Temporal Key Integrity Protocol (TKIP)
c. cyclic redundancy check (CRC)
d. Message Integrity Check (MIC)
15. Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
a. Frequency band
b. Channel selection
c. RFID spectrum
d. Channel width
16. A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?
a. Controller AP
b. Standalone AP
c. Fat AP
d. Any type of AP can be managed by a WLC.
17. AES-CCMP is the encryption protocol standard used in _____ .
a. WPA
b. WPA2
c. IEEE 802.11
d. NFC
18. Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?
a. It is the transport protocol used in TCP/IP for authentication.
b. It is a framework for transporting authentication protocols.
c. It is a subset of WPA2.
d. It is a technology used by IEEE 802.
11 for encryption. 19. Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
a. EAP-TLS
b. EAP-TTLS
c. EAP-SSL
d. EAP-FAST
20. Which of these is NOT a type of wireless AP probe?
a. Wireless device probe
b. WNIC probe
c. Dedicated probe
d. AP prob
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started