Question: 1. Bluetooth LE ________. uses about 0.1 to 0.5 watts assumes that transmissions will be infrequent has terse connection openings All of these 2. If

1.

Bluetooth LE ________.

uses about 0.1 to 0.5 watts

assumes that transmissions will be infrequent

has terse connection openings

All of these

2.

If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________.

still protected by a firewall

still protected by encryption

both still protected by a firewall and still protected by encryption

neither still protected by a firewall nor still protected by encryption

3.

The protection of communication between a wireless client and the access point is ________.

link security

end-to-end security

both link security and end-to-end security

neither link security nor end-to-end security

4.

When a wireless client in an evil twin attack transmits, ________.

the evil twin reads the packet, encrypts it, and passes on the packet

the evil twin reads the packet and passes on the packet

the evil twin reads the frame, encrypts it, and passes on the frame

the evil twin reads the frame and passes on the frame

5.

Bluetooth uses ________ operation.

all-to-all

one-to-all

one-to-one

point-to-multipoint

6.

The state of security in IoT transmission standards is ________.

mixed

weak

strong

flawless

7.

A security might use SNMP Get commands to ________.

change an access point's power

collect information to look for a rogue access point

both change an access point's power and collect information to look for a rogue access point

neither change an access point's power nor collect information to look for a rogue access point

8.

If a firm has many access points, it should use ________ initial authentication mode in 802.11i.

PSK

IPsec

802.1X

WPA

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!