Preview

Security+ Guide to Network Security Fundamentals - Chapter 8 Quiz Essay Example

Satisfactory Essays
Open Document
Open Document
724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security+ Guide to Network Security Fundamentals - Chapter 8 Quiz Essay Example
Chapter 8 Quiz – Security+ - A Guide to Network Security Fundamentals


Question 1
0 out of 4 points
Bluetooth devices are not backward compatible with previous versions.
Answer
Selected Answer:
Correct Answer:



True
False

Question 2
4 out of 4 points
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Answer
Selected Answer:
Correct Answer:



True
True

Question 3
4 out of 4 points
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Answer
Selected Answer:
Correct Answer:



False
False

Question 4
4 out of 4 points
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Answer
Selected Answer:
Correct Answer:

False
False



Question 5
4 out of 4 points
APs use antennas that radiate a signal in all directions.
Answer
Selected Answer:
Correct Answer:



True
True

Question 6
0 out of 4 points
Bluetooth is a ____ technology designed for data communication over short distances.
Answer
Selected Answer:
Correct Answer:



c.
Private Area Network
d.
Personal Area Network

Question 7
4 out of 4 points
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
Answer
Selected Answer:

d.
33

Correct Answer:

d.
33



Question 8
4 out of 4 points
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the
____ specifications.
Answer
Selected Answer:

a.
Bluetooth v1.2

Correct Answer:



a.
Bluetooth v1.2

Question 9
4 out of 4 points
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
Answer
Selected Answer:
Correct Answer:



a. active a. active Question 10
4 out of 4 points
A group of piconets in which connections

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What would be the effect of removing either the Matching Principle or the Revenue Recognition Principle from the process? Use a concrete example of how doing so might affect accounting in a given period.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Expand HTTP and select Page Response Time (sec). Select Show and zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following:…

    • 765 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    If you are applying an extended ACL to deny specific packets, where should you apply it, as close to the source as possible or as close to the destination as possible? Explain your answer.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)…

    • 355 Words
    • 3 Pages
    Best Essays
  • Better Essays

    Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Computers systems are an essential piece of equipment in many people’s everyday lives they have to deal with a lot of processes information and be able to go on the internet where there is a risk of getting viruses and bugs. This is why computer systems have to be equipped with the right software utilities to ensure that they are working at their best at all times. There are many different types of software utilities available for a computer system I will explain them in detail in this report.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    You have recently been appointed to a position of financial analyst with a large manufacturing concern. Your immediate superior has brought the CFO into your office, explaining that you are a graduate from the Accounting and Financial Management program at the University of Waterloo, and therefore, you are a computer wizard.…

    • 567 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Quiz 1 Essay Example

    • 809 Words
    • 4 Pages

    6. In medical word building, a combining form is used to link a suffix that begins with:…

    • 809 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Question 1: What would the first-year costs be to AML if it purchased the 10 used 20-foot containers? How long would it take to recoup the investment, assuming that the mushroom traffic continued?…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4. What combination of the two goods below allows you to maximize your utility with a budget constraint of $14? Show how you arrived at your conclusion in the space provided below. Place your final answers on the lines at the bottom of this page.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | In the Classical Theory, if businesses want fewer funds, the interest rate will _________ and people will save less…

    • 4050 Words
    • 17 Pages
    Good Essays
  • Good Essays

    The Secret Sharer is a short story that is written by Joseph Conrad. It is an interesting story that makes people ask questions. This is a story about a newly-promoted young nameless captain who hides a murderer called Leggatt on his ship. Leggatt swims to the captain's ship after killing one of his shipmates on a ship named the Sephora. Leggatt is then met by the captain who is on lookout duty alone. After having a little chat with Leggatt, he hides Leggatt in his cabin. The captain even lies for Leggatt when the skipper of the Sephora visits him. After that, the captain brings his ship close to the land so that Leggatt can escape safely.…

    • 821 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The term computer _____ best describes the level of technology skills needed in today’s business.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Toshendra Sharma, 113050013 Saptarshi Sarkar, 113050044 Pankaj Vanwari, 114058001 Under guidance of: Prof. Bernard Menezes Outline  Bluetooth history  Bluetooth Protocol  Layers in Bluetooth  Security in Bluetooth  Vulnerabilities  Attacks/Exploits  Demonstration Bluetooth Technology  proprietary open wireless technology standard for exchanging data over short distances  was originally conceived as a wireless alternative to RS232 data cables  It uses short wave length radio transmission in ISM band from 2400-2480 MHz Benefits of Bluetooth Technology  Cable replacement  Ease of file sharing  Wireless synchronization  Internet connectivity Implementation  frequency hopping spread spectrum  chops up the data being sent and transmits chunks of it up to 79 bands  Packet Based Protocol with a Master-Slave Structure  Piconet  A piconet is an ad-hoc computer network which used to link group of devices, where protocols allow one master device to interconnect with up to seven active slaves…

    • 935 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Java Bluetooth

    • 29009 Words
    • 117 Pages

    In March 2002 a final year thesis project was undertaken based on a suggestion by Henry Valk of HCV Wireless to investigate the development of a Java application for a Bluetooth platform. The Bluetooth standard is a short range wireless technology that allows different types of devices to form automatic, spontaneous networks. Java applications are portable, secure and robust, which makes them suitable for users of Bluetooth devices to wirelessly download and use to access a service.…

    • 29009 Words
    • 117 Pages
    Powerful Essays