Chapter 6 Quiz - Marks 3 Mobile devices constantly survey...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Marks: 3 Mobile devices constantly survey the radio frequencies at regular intervals to determine if a different AP can provide better service. If it finds one, then the device automatically attempts to associate with the new AP (this process is called ____). Choose one answer. a. beaconing b. a turnoff c. a handoff d. scanning Correct Marks for this submission: 3/3. Question 2 Marks: 3 The WEP _________________________ is a 24-bit value that changes each time a packet is encrypted. Answer: Incorrect Correct answer: initialization vector (IV) Marks for this submission: 0/3. Question 3 Marks: 2 ____ allows a device to become authenticated to an AP before moving into range of the AP. Choose one answer. a. AES-CCMP b. Pre-authentication c. Key-caching d. Roaming Correct Marks for this submission: 2/2.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Question 4 Marks: 3 IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from a wireless access point and later returns, he does not need to re-enter all of the credentials. Choose one answer. a. pre-authentication b. AES-CCMP c. PSK d. key-caching Correct Marks for this submission: 3/3. Question 5 Marks: 3 Open system authentication is considered strong since authentication is based on only one factor: a match of SSIDs. Choose one answer. a. True b. False Correct Marks for this submission: 3/3. Question 6 Marks: 9 Match each item with a statement below: designed to prevent an attacker from capturing, altering, and resending data packets the APs are positioned so that the cells overlap to facilitate movement between cells acts as the central “base station” for the wireless network uses a passphrase to generate the encryption key a process in which the AP accepts or rejects a wireless device the second generation of WPA security supports wireless devices that are up to 115 meters (375 feet) apart using the 2.4 gigahertz
Background image of page 2
(GHz) radio frequency spectrum the most common type of scanning the number of seconds between generating a new key
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 11

Chapter 6 Quiz - Marks 3 Mobile devices constantly survey...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online