Matching
-The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.
A) Bluejacking
B) Bluesnarfing
C) Initialization vector (IV)
D) Near field communication (NFC)
E) Preshared key (PSK)
F) RF Jamming
G) War driving
H) Wi-Fi Protected Setup (WPS)
I) Wi-Fi Protected Access 2 (WPA 2)
J) Wired Equivalent Privacy (WEP)
Correct Answer:
Verified
Q17: An access point that is unauthorized and
Q18: Slave devices that are connected to a
Q19: Select the EAP protocol supported by WPA2
Q20: The IEEE 802.15.1-2005 standard is based on
Q21: A Bluetooth attack in which the attacker
Q24: On a piconet, slave devices that are
Q26: How can an administrator force wireless clients
Q27: Matching
-An IEEE 802.11 security protocol designed to
Q28: Matching
-An attack that accesses unauthorized information from
Q34: When using AES-CCMP,the AES-256 bit key requires
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents