Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following refers to the process of assigning a different MAC address to your network card than the one issues by the manufacturer?

Which of the following refers to the process of assigning a different MAC address to your network card than the one issues by the manufacturer?
Group of answer choices
Warchalking
MAC filtering
Wardriving
MAC spoofing
Which of the following is a popular daemon for implementing wireless access point functionality on Linux operating systems?
Group of answer choices
Mininet-WiFi
GHostAPd
Hostapd
Lubuntu
Which of the following refers to the process of using a laptop to search for unsecured Wi-Fi networks?
Group of answer choices
Wardriving
Wardialing
Warchalking
Warsurfing
Which of the following provides the MAC address of the access point?
Group of answer choices
DNS name
SSID
IP Address
BSSID
How often do access points broadcast their signals?
Group of answer choices
Once every millisecond
Every second
Once every 100 milliseconds
Once every 10 milliseconds
Which type of antennae should you use to expand your wireless field of view?
Group of answer choices
Isotropic antenna
Multidirectional antenna
Dipole antenna
Directional antenna
Which of the following should be considered when selecting a WLAN target?
Group of answer choices
Both networks with security controls that are disabled and networks with a strong signal
Networks that are located in residential areas
Networks with a strong signal
Networks with security controls that are disabled
When using Kismet, what could you infer from a network that was highlighted in green?
Group of answer choices
WEP security is being used on the network.
WPA/WPA2 security is being used on the network.
No security exists on this network.
Which of the following should be completed to harden the security of a wireless network?
Group of answer choices
Increase the transmission power of the network.
Switch to a WEP security method.
Put the AP in the middle of the property.
Ensure that the SSID is visible.
Which of the following determines the strength of a WPA2-Personal network?
Group of answer choices
The length of the key used to secure it.
The installation of additional security measures on the network.
The version of firmware installed.
The power of the network being transmitted.
Which of the following is the weakest choice with regards to wireless security?
Group of answer choices
WPA2-TKIP
WPA2-CCMP
WEP
WPA2-AES
How many bits are in a hex digit?
Group of answer choices
8
4
2
6
Which of the following is true regarding block ciphers?
Group of answer choices
They encrypt data one bit at a time.
They are a more efficient method of encryption.
They encrypt data into predetermined chunks.
They utilize a simple bit-by-bit approach.
Which of the following is used as a seed for the encryption algorithm and is supposed to ensure that two different ciphertexts would be produced if the same plaintext data were encrypted twice?
Group of answer choices
Initialization Vector (IV)
Packet key
RC4 cipher
Key Index
Which mode of virtual interface mode will inspect all packets on your network regardless of the source and destination addresses?
Group of answer choices
Monitor mode
All-hearing mode
Full view mode
Promiscuous mode
What do access points use to announce their presence to nearby clients?
Group of answer choices
Encryption
Beacons
Terminals
DNS requests
What is the IV length for WPA2/802.11i security?
Group of answer choices
24 bits
48 bits
128 bits
64 bits
Which of the following approaches to WEP key cracking only works on ARP packets?
Group of answer choices
Decryption keys
PTW
FMS
KoreK
What should you do when using an open connection to remain secure?
Group of answer choices
Visit sites that make DNS requests.
Use a VPN provider.
Avoid using free, open connections.
Visit only obscure websites that enforce http.
When is the "Extended" portion added to the SSID?
Group of answer choices
When the power of the network extends to reach a greater distance.
When the wireless network piggybacks off another wireless network.
When there are multiple access points within the same wireless network.
When there is a single access point within the wireless network.
Which of the following displays the 802.11 protocols (a, b, g, n or ac) in a scanning area?
Group of answer choices
PHY mode coverage
Frequency band
Transmitter signal level
Signal-to-interference ratio (SIR)
Which of the following allows for the visualization of RF coverage, signal strength, and signal interference levels over an entire site?
Group of answer choices
Wi-Fi audit
Wi-Fi heatmaps
Wi-Fi traffic analysis
Wi-Fi site survey
Which of the following represents the relative difference between the power level of a desired signal compared to those of competing Wi-Fi signals on the same channel?
Group of answer choices
PHY mode coverage
Frequency band
Transmitter signal level
Signal-to-interference ratio (SIR)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions