Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 2 0 1 pts True or False? Spread - spectrum systems are less susceptible to the effects of multipath because the broad frequency range

Question 201 pts
True or False? Spread-spectrum systems are less susceptible to the effects of multipath because the broad frequency range used mitigates them on any given frequency.
Group of answer choices
True
False
Flag question: Question 21
Question 211 pts
Which of the following best describes bluesnarfing?
Group of answer choices
A storekeeper in a shopping mall sets up Bluetooth-enabled devices with high-gain antennas to spam any Bluetooth-enabled devices passing by.
It is a technique whereby an attacker gains access to unauthorized information on a Bluetooth-enabled device.
It is a method that enables an attacker to take control of a Bluetooth-enabled device.
Whenever a Bluetooth-enabled device comes near another Bluetooth device, they begin to communicate without any user initiation or intervention.
Flag question: Question 22
Question 221 pts
True or False? Wardriving is an attack from outside the boundaries of the home or business premises.
Group of answer choices
True
False
Flag question: Question 23
Question 231 pts
When planning a cyberattack, attackers will spend a great deal of time profiling a network and organization, probing for clues to the systems and devices deployed on the network. What is the first step in the planning phase of an attack?
Group of answer choices
Plan the actual tactics of the attack that will allow them to associate with a specific access point
Capture packets traversing the air interface
Use wireless scanning software to detect the presence of a poorly deployed 802.11 wireless network
Gather Layer 2 network information, such as media access control (MAC) addresses and service set identifiers (SSIDs)
Flag question: Question 24
Question 241 pts
True or False? Wireless networks are vulnerable to malicious data injection because these networks do not use firewalls.
Group of answer choices
True
False
Flag question: Question 25
Question 251 pts
What is a pre-Robust Security Network (RSN) Layer 2 encryption method that protects information in the payload from Layers 3 through 7?
Group of answer choices
Open System Authentication (OSA)
Wi-Fi Protected Access (WPA)
Wired Equivalent Privacy (WEP)
Temporal Key Integrity Protocol (TKIP)
Flag question: Question 26
Question 261 pts
Which of the following was viewed as an interim solution to address serious weaknesses in another data protection technology?
Group of answer choices
WPA2-PSK
WPA2-EAP
WPA
WEP
Flag question: Question 27
Question 271 pts
True or False? Disabling unused Ethernet switch ports by default helps to prevent rogue access points from getting an Ethernet backhaul connection.
Group of answer choices
True
False
Flag question: Question 28
Question 281 pts
True or False? A dead spot on a wireless network is where the radio signal does not reach.
Group of answer choices
True
False
Flag question: Question 29
Question 291 pts
On a network, which type of guest access enables all visitors to share a known password for user authentication?
Group of answer choices
Provisioned guest access
Common guest password
Open access
Closed access
Flag question: Question 30
Question 301 pts
True or False? The IEEE 802.1X specification describes three entities: supplicant, authenticator, and authentication server.
Group of answer choices
True
False
Flag question: Question 31
Question 311 pts
True or False? For a large-scale wireless network, the most common design is to have overlapping coverage areas so the network can support seamless roaming.
Group of answer choices
True
False
Flag question: Question 32
Question 321 pts
True or False? An access point with a built-in Remote Authentication Dial-In User Service (RADIUS) client cannot communicate directly with a RADIUS server.
Group of answer choices
True
False
Flag question: Question 33
Question 331 pts
True or False? SQL injection attacks are common on dynamic websites that front a database and can occur when input is not validated.
Group of answer choices
True
False
Flag question: Question 34
Question 341 pts
Maria is a network technician. She wants to view a list of network connections, routing tables, and network interface information, such as protocol performance, on a computer. Which of the following should Maria use?
Group of answer choices
InSSIDer
tracert
netstat
ping
Flag question: Question 35
Question 351 pts
True or False? An important distinction between vulnerability scanning and pentesting is that pentests are non-intrusive and do not cause damage, whereas vulnerability scans can cause an outage.
Group of answer choices
True
False
Flag question: Question 36
Question 361 pts
Which of the following is not true of penetration testing?
Group of answer choices
It requires permission.
It is best not to seek permission ahead of tim

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Information And Database Systems Asian Conference Aciids 2012 Kaohsiung Taiwan March 2012 Proceedings Part 2 Lnai 7197

Authors: Jeng-Shyang Pan ,Shyi-Ming Chen ,Ngoc-Thanh Nguyen

2012th Edition

3642284892, 978-3642284892

More Books

Students also viewed these Databases questions

Question

Are the terms child molester and pedophile the same?

Answered: 1 week ago