Question: 1. Bluetooth LE ________. uses about 0.1 to 0.5 watts assumes that transmissions will be infrequent has terse connection openings All of these 2. If
1.
Bluetooth LE ________.
| uses about 0.1 to 0.5 watts | ||
| assumes that transmissions will be infrequent | ||
| has terse connection openings | ||
| All of these |
2.
If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________.
| still protected by a firewall | ||
| still protected by encryption | ||
| both still protected by a firewall and still protected by encryption | ||
| neither still protected by a firewall nor still protected by encryption |
3.
The protection of communication between a wireless client and the access point is ________.
| link security | ||
| end-to-end security | ||
| both link security and end-to-end security | ||
| neither link security nor end-to-end security |
4.
When a wireless client in an evil twin attack transmits, ________.
| the evil twin reads the packet, encrypts it, and passes on the packet | ||
| the evil twin reads the packet and passes on the packet | ||
| the evil twin reads the frame, encrypts it, and passes on the frame | ||
| the evil twin reads the frame and passes on the frame |
5.
Bluetooth uses ________ operation.
| all-to-all | ||
| one-to-all | ||
| one-to-one | ||
| point-to-multipoint |
6.
The state of security in IoT transmission standards is ________.
| mixed | ||
| weak | ||
| strong | ||
| flawless |
7.
A security might use SNMP Get commands to ________.
| change an access point's power | ||
| collect information to look for a rogue access point | ||
| both change an access point's power and collect information to look for a rogue access point | ||
| neither change an access point's power nor collect information to look for a rogue access point |
8.
If a firm has many access points, it should use ________ initial authentication mode in 802.11i.
| PSK | ||
| IPsec | ||
| 802.1X | ||
| WPA |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
