Correct Answer
verified
Multiple Choice
A) cause harm
B) frustrate users
C) practice hacking
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) DoS attack
B) DDoS attack
C) ICMP
D) None of the above.
Correct Answer
verified
Multiple Choice
A) WPA
B) WPA2
C) WEP
D) None of the above
Correct Answer
verified
Multiple Choice
A) EAP, RADUS
B) RADIUS, EAP
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) confidentiality
B) integrity
C) availability
D) authentication
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Correct Answer
verified
Multiple Choice
A) Transmitting IVs in the clear
B) Making the IV too short
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) avoid configuration expenses for access points
B) avoid configuration expenses for wireless clients
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a request for a different authentication mechanism
B) a negative acknowledgement
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) wired, wireless
B) wireless, wired
C) about an equal concern for wired and wireless LANs
D) None of the above
Correct Answer
verified
Multiple Choice
A) 802.11i
B) WPA
C) WEP
D) None of the above
Correct Answer
verified
Showing 1 - 20 of 119
Related Exams