Course Hero Logo

References references labsim for network pro section

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 18 - 20 out of 51 pages.

ReferencesReferencesLabSim for Network Pro, Section 15.4.LabSim for Network Pro, Section 15.4.[netpro15_all_questions_en.exm MCS8][netpro15_all_questions_en.exm MCS8]Question 33:Question 33:CorrectCorrectWhich of the following provides security for wireless networks?Which of the following provides security for wireless networks?802.3u802.3uCSMA/CDCSMA/CD802.11a802.11aWAPWAPPage 18 of 51
12/11/2017
WPAWPAExplanationExplanationWi-Fi Protected Access (WPA) provides encryption and user authentication for wirelessWi-Fi Protected Access (WPA) provides encryption and user authentication for wirelessnetworks. Wired Equivalent Privacy (WEP) also provides security, but WPA is considered morenetworks. Wired Equivalent Privacy (WEP) also provides security, but WPA is considered moresecure than WEP.secure than WEP.A wireless access point (WAP) is a hardware device, like a switch, that provides access to theA wireless access point (WAP) is a hardware device, like a switch, that provides access to thewireless network. 802.11a is a wireless networking standard that defines the signalwireless network. 802.11a is a wireless networking standard that defines the signalcharacteristics for communicating on the wireless network. CSMA/CD is a media access controlcharacteristics for communicating on the wireless network. CSMA/CD is a media access controlmethod that controls when a device can communicate on the network.method that controls when a device can communicate on the network.
ReferencesReferencesLabSim for Network Pro, Section 10.6.LabSim for Network Pro, Section 10.6.[netpro15_all_questions_en.exm APESS_6-1 MULTIPLE CHOICE [230]][netpro15_all_questions_en.exm APESS_6-1 MULTIPLE CHOICE [230]]Question 34:Question 34:IncorrectIncorrectA security administrator is conducting a penetration test on a network. She connects aA security administrator is conducting a penetration test on a network. She connects anotebook system to a mirror port on a network switch. She then uses a packet sniffer tonotebook system to a mirror port on a network switch. She then uses a packet sniffer tomonitor network traffic to try and determine which operating systems are running on networkmonitor network traffic to try and determine which operating systems are running on networkhosts.hosts.Which process did the administrator use in the penetration test in this scenario?Which process did the administrator use in the penetration test in this scenario?
References

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 51 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Computer network, Network switch

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture