Quiz 8 Flashcards
RF signal “noise” that creates interference and prevents communications from occurring is called signal blocking. T/F
False
RFID is commonly used to transmit information between networked computers.
T/F
False
For IEEE WLANs, the maximum transmit power is 200 milliwatts (mW).
T/F
True
The current Bluetooth version is Bluetooth 6.
T/F
False
In ad hoc mode, devices can only communicate between themselves and cannot connect to another network.
T/F
True
Piconets in which connections exist between different piconets are known as which of the following terms?
- broadnet
- honeynet
- boundnet
- scatternet
- scatternet
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
- access point probe
- dedicated probe
- WAP
- wireless device probe
- WAP
Which encryption protocol below is used in the WPA2 standard?
AES-CCMP
The MAC address is a unique 64-bit number that is “burned” into the network interface card adapter when it is manufactured.
T/F
False
RF signals can be picked up from an open or mis-configured AP.
T/F
True
Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information.
T/F
True
Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity.
T/F
True
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner’s knowledge or permission.
T/F
False
Which of the following is the most secure form of IEEE 802.1x authentication?
certificate-based authentication
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
rogue