Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I want answer this Q, please 11. Which of these is a vulnerability of MAC address filtering? a. APs use IP addresses instead of MACs.

I want answer this Q, please

11. Which of these is a vulnerability of MAC address filtering?

a. APs use IP addresses instead of MACs.

b. The user must enter the MAC.

c. MAC addresses are initially exchanged unencrypted.

d. Not all operating systems support MACs.

12. Which of these is NOT a limitation of turning off the SSID broadcast from an AP?

a. Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.

b. Some versions of operating systems favor a network that broadcasts an SSID over one that does not. c. Users can more easily roam from one WLAN to another.

d. The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.

13. What is the primary weakness of wired equivalent privacy (WEP)?

a. It functions only on specific brands of APs.

b. Its usage creates a detectable pattern.

c. It slows down a WLAN from 104 Mbps to 16 Mbps.

d. Initialization vectors (IVs) are difficult for users to manage.

14. WPA replaces WEP with _____.

a. WPA2

b. Temporal Key Integrity Protocol (TKIP)

c. cyclic redundancy check (CRC)

d. Message Integrity Check (MIC)

15. Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?

a. Frequency band

b. Channel selection

c. RFID spectrum

d. Channel width

16. A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?

a. Controller AP

b. Standalone AP

c. Fat AP

d. Any type of AP can be managed by a WLC.

17. AES-CCMP is the encryption protocol standard used in _____ .

a. WPA

b. WPA2

c. IEEE 802.11

d. NFC

18. Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?

a. It is the transport protocol used in TCP/IP for authentication.

b. It is a framework for transporting authentication protocols.

c. It is a subset of WPA2.

d. It is a technology used by IEEE 802.

11 for encryption. 19. Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?

a. EAP-TLS

b. EAP-TTLS

c. EAP-SSL

d. EAP-FAST

20. Which of these is NOT a type of wireless AP probe?

a. Wireless device probe

b. WNIC probe

c. Dedicated probe

d. AP prob

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

2nd Edition

1597499471, 978-1597499477

More Books

Students also viewed these Databases questions

Question

create loop and function in php

Answered: 1 week ago