TCN 4081 Final Test Questions & Answers 2024/2025
Personal area network (PAN) - ANSWERSBluetooth falls under the category of _______.
Piconet - ANSWERSA Bluetooth network that contains one master and at least one slave using the same RF channel forms a ______
Bluesnarfing - ANSWERS_____ ...
Personal area network (PAN) - ANSWERSBluetooth falls under the category of _______.
Piconet - ANSWERSA Bluetooth network that contains one master and at least one slave using the same
RF channel forms a ______
Bluesnarfing - ANSWERS_____ is the unauthorized access of information from a wireless device through
a Bluetooth connection.
802.11a - ANSWERSThe IEEE _____ standard specifies a maximum rated speed of 54 Mbps using the 5
GHz spectrum.
Smaller coverage area - ANSWERSEach of the following is an advantage of IEEE 802.11n except _______.
Intrusion detection system (IDS) - ANSWERSWhich of the following is not found in a residential WLAN
gateway?
GPS receiver - ANSWERSWhich of the following is not a requirement for war driving?
Rogue access point - ANSWERSThe primary design of a(n) _____ is to capture the transmissions from
legitimate users.
MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format -
ANSWERSWhich is the following is a vulnerability of MAC address filtering?
Users can more easily roam from one WLAN to another - ANSWERSEach of the following is a limitation of
turning off the SSID broadcast from an AP except _______.
, Its usage creates a detectable pattern - ANSWERS11.-The primary weakness of wired equivalent privacy
(WEP) is ________.
Wi-Fi Protected Access 2 (WPA2) - ANSWERSThe two models for personal wireless security developed by
the Wi-Fi Alliance are Wi-Fi Protected ____.
20 - ANSWERSA preshared key (PSK) of fewer than _____ characters may be subject to an attack if that
key is a common dictionary word.
Has an initialization vector (IV) that is the same length as a WEP key of 64 bits. - ANSWERSA WEP key
that is 128 bits in length _____.
WPA2 - ANSWERSAES-CCMP is the encryption protocol standard used in ________.
EAP is a framework for transporting authentication protocols. - ANSWERSWhat is the Extensible
Authentication Protocol (EAP)?
PEAP - ANSWERSWhich technology should be used instead of LEAP?
WNIC probe - ANSWERSEach of the following is a type of wireless AP probe except ________.
AP - ANSWERSThe most flexible approach for a wireless VLAN is to have which device separate the
packets?
Supplicant - ANSWERSA RADIUS authentication server requires that the _____ be authenticated first.
Determining user need (analyzing) - ANSWERSEach of the following make up the AAA elements in
network security except _______.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bensuda. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.99. You're not tied to anything after your purchase.