Why do you think this is possible?
In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He
concludes that since his access points require the client computer to have the proper SSID, it
would prevent others from connecting to the wireless network. Unfortunately unauthorized users
are still able to connect to the wireless network.
Why do you think this is possible?
which of the following techniques would be most effective in determining whether end-user security training wo
When utilizing technical assessment methods to assess the security posture of a network, which
of the following techniques would be most effective in determining whether end-user security
training would be beneficial?
Which of the following statements is true?
In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna
positioning. He places the antenna for the access points near the center of the building. For those
access points near the outer edge of the building he uses semi-directional antennas that face
towards the building’s center. There is a large parking lot and outlying filed surrounding the
building that extends out half a mile around the building. Ulf figures that with this and his
placement of antennas, his wireless network will be safe from attack.
Which of the following statements is true?
What is the broadcast address for the subnet 190.86.168.0/22?
What is the broadcast address for the subnet 190.86.168.0/22?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following are valid types of rootkits?
Which of the following are valid types of rootkits? (Choose three.)
Which of the following is true of the wireless Service Set ID (SSID)?
Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)
which of the following?
John the Ripper is a technical assessment tool used to test the weakness of which of the
following?
Which of the following wireless technologies can be detected by NetStumbler?
Which of the following wireless technologies can be detected by NetStumbler? (Select all that
apply)
Which ports should the administrator open?
A company has made the decision to host their own email and basic web services. The
administrator needs to set up the external firewall to limit what protocols should be allowed to get
to the public part of the company’s network. Which ports should the administrator open?
(Choose three.)