Wi-Fi is a trademark, introduced in 1999 and owned by the Wi-Fi Alliance, that is used to brand wireless technologies that conform to the: correct answers 802.11 standard
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards, which range from 802.11a to 802.11n,...
CIS 171 Final || WITH CORRECT SOLUTIONS!!
Wi-Fi is a trademark, introduced in 1999 and owned by the Wi-Fi Alliance, that is used to
brand wireless technologies that conform to the: correct answers 802.11 standard
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards,
which range from 802.11a to 802.11n, are known collectively in standard jargon as: correct
answers Wi-Fi
Which of the following was the first wireless standard that saw any major usage outside of
proprietary or custom deployments? correct answers 802.11 standard
Which of the following allows someone authorized or unauthorized to send messages to a cell
phone? correct answers Bluejacking
Which of the following is used to steal data from a phone? correct answers Bluesnarfing
In wireless networks based on the 802.11 standard, stations transmit their messages using the:
correct answers Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A setup created by wireless networking technologies that are designed to extend or replace
wired networks is called: correct answers wireless local area network (WLAN)
Which of the following is entered ahead of time for both the access point (AP) and client so
they can authenticate and associate securely? correct answers Preshared keys
Which of the following is a capability implemented through Bluetooth technology, designed
to reach a maximum range on average of 10 meters or 30 feet? correct answers Personal area
network (PAN)
Which class of individuals is primarily concerned with the security of the Web server because
it can provide an easy means of getting into the local network? correct answers Server
administrator
Which class of individuals works the most with servers and is primarily concerned with
access to content and services? correct answers End user
Which type of attack relies on a variation of the input validation attack but has the goal of
going after a user instead of the application or data? correct answers Cross-site scripting
(XSS)
Exploitative behaviors against Web applications include all of the following EXCEPT:
correct answers man-in-the-middle attacks
Common database vulnerabilities include all of the following EXCEPT: correct answers
strong audit log settings
NGSSquirreL and AppDetective are: correct answers pieces of software for performing
audits on databases
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ProPerfomer. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.