What is the broadcast address for the subnet 190.86.168.0/22?
What is the broadcast address for the subnet 190.86.168.0/22?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following are valid types of rootkits?
Which of the following are valid types of rootkits? (Choose three.)
Which of the following is true of the wireless Service Set ID (SSID)?
Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)
which of the following?
John the Ripper is a technical assessment tool used to test the weakness of which of the
following?
Which of the following wireless technologies can be detected by NetStumbler?
Which of the following wireless technologies can be detected by NetStumbler? (Select all that
apply)
Which ports should the administrator open?
A company has made the decision to host their own email and basic web services. The
administrator needs to set up the external firewall to limit what protocols should be allowed to get
to the public part of the company’s network. Which ports should the administrator open?
(Choose three.)
What would be the easiest way to circumvent and communicate on the WLAN?
While probing an organization you discover that they have a wireless network. From your attempts
to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the
access points. What would be the easiest way to circumvent and communicate on the WLAN?
802.11b is considered a ____________ protocol.
802.11b is considered a ____________ protocol.
Which type of scan measures a person’s external features through a digital video camera?
Which type of scan measures a person’s external features through a digital video camera?