Zusammenfassung der Ressource
Frage 1
Frage
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Antworten
-
a. rogue
-
b. sanctioned
-
c. legitimate
-
d. random
Frage 2
Frage
An ____ is an AP that is set up by an attacker.
Antworten
-
a. active twin
-
b. internal replica
-
c. evil twin
-
d. authorized twin
Frage 3
Frage
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
Frage 4
Frage
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Antworten
-
a. Sanctioned
-
b. Rogue
-
c. Legitimate
-
d. Twin
Frage 5
Frage
____ is the encryption protocol standard for WPA2.
Antworten
-
a. AES-CCMP
-
b. AES-TKIP
-
c. AES-CTR
-
d. AES-SCMP
Frage 6
Frage
____ requires mutual authentication used for WLAN encryption using Cisco client software.
Antworten
-
a. PEAP
-
b. TKIP
-
c. EAP
-
d. LEAP
Frage 7
Frage
APs use antennas that radiate a signal in all directions.
Frage 8
Frage
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Frage 9
Frage
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Frage 10
Frage
Bluetooth devices are not backward compatible with previous versions.