Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Which of the following refers to the process of assigning a different MAC address to your network card than the one issues by the manufacturer?
Which of the following refers to the process of assigning a different MAC address to your network card than the one issues by the manufacturer?
Group of answer choices
Warchalking
MAC filtering
Wardriving
MAC spoofing
Which of the following is a popular daemon for implementing wireless access point functionality on Linux operating systems?
Group of answer choices
MininetWiFi
GHostAPd
Hostapd
Lubuntu
Which of the following refers to the process of using a laptop to search for unsecured WiFi networks?
Group of answer choices
Wardriving
Wardialing
Warchalking
Warsurfing
Which of the following provides the MAC address of the access point?
Group of answer choices
DNS name
SSID
IP Address
BSSID
How often do access points broadcast their signals?
Group of answer choices
Once every millisecond
Every second
Once every milliseconds
Once every milliseconds
Which type of antennae should you use to expand your wireless field of view?
Group of answer choices
Isotropic antenna
Multidirectional antenna
Dipole antenna
Directional antenna
Which of the following should be considered when selecting a WLAN target?
Group of answer choices
Both networks with security controls that are disabled and networks with a strong signal
Networks that are located in residential areas
Networks with a strong signal
Networks with security controls that are disabled
When using Kismet, what could you infer from a network that was highlighted in green?
Group of answer choices
WEP security is being used on the network.
WPAWPA security is being used on the network.
No security exists on this network.
Which of the following should be completed to harden the security of a wireless network?
Group of answer choices
Increase the transmission power of the network.
Switch to a WEP security method.
Put the AP in the middle of the property.
Ensure that the SSID is visible.
Which of the following determines the strength of a WPAPersonal network?
Group of answer choices
The length of the key used to secure it
The installation of additional security measures on the network.
The version of firmware installed.
The power of the network being transmitted.
Which of the following is the weakest choice with regards to wireless security?
Group of answer choices
WPATKIP
WPACCMP
WEP
WPAAES
How many bits are in a hex digit?
Group of answer choices
Which of the following is true regarding block ciphers?
Group of answer choices
They encrypt data one bit at a time.
They are a more efficient method of encryption.
They encrypt data into predetermined chunks.
They utilize a simple bitbybit approach.
Which of the following is used as a seed for the encryption algorithm and is supposed to ensure that two different ciphertexts would be produced if the same plaintext data were encrypted twice?
Group of answer choices
Initialization Vector IV
Packet key
RC cipher
Key Index
Which mode of virtual interface mode will inspect all packets on your network regardless of the source and destination addresses?
Group of answer choices
Monitor mode
Allhearing mode
Full view mode
Promiscuous mode
What do access points use to announce their presence to nearby clients?
Group of answer choices
Encryption
Beacons
Terminals
DNS requests
What is the IV length for WPAi security?
Group of answer choices
bits
bits
bits
bits
Which of the following approaches to WEP key cracking only works on ARP packets?
Group of answer choices
Decryption keys
PTW
FMS
KoreK
What should you do when using an open connection to remain secure
Group of answer choices
Visit sites that make DNS requests.
Use a VPN provider.
Avoid using free, open connections.
Visit only obscure websites that enforce http
When is the "Extended" portion added to the SSID?
Group of answer choices
When the power of the network extends to reach a greater distance.
When the wireless network piggybacks off another wireless network.
When there are multiple access points within the same wireless network.
When there is a single access point within the wireless network.
Which of the following displays the protocols a b g n or ac in a scanning area?
Group of answer choices
PHY mode coverage
Frequency band
Transmitter signal level
Signaltointerference ratio SIR
Which of the following allows for the visualization of RF coverage, signal strength, and signal interference levels over an entire site?
Group of answer choices
WiFi audit
WiFi heatmaps
WiFi traffic analysis
WiFi site survey
Which of the following represents the relative difference between the power level of a desired signal compared to those of competing WiFi signals on the same channel?
Group of answer choices
PHY mode coverage
Frequency band
Transmitter signal level
Signaltointerference ratio SIR
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started