A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
a. rogue
b. sanctioned
c. legitimate
d. random
An ____ is an AP that is set up by an attacker.
a. active twin
b. internal replica
c. evil twin
d. authorized twin
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
a. 15
b. 33
c. 18
d. 10
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
a. Sanctioned
b. Rogue
c. Legitimate
d. Twin
____ is the encryption protocol standard for WPA2.
a. AES-CCMP
b. AES-TKIP
c. AES-CTR
d. AES-SCMP
____ requires mutual authentication used for WLAN encryption using Cisco client software.
a. PEAP
b. TKIP
c. EAP
d. LEAP
APs use antennas that radiate a signal in all directions.
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Bluetooth devices are not backward compatible with previous versions.