• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

1. In which type of network can every computer communicate directly with the other

Testbanks Dec 29, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Chapter 1

  • In which type of network can every computer communicate directly with the other
  • computers on the same network without going through an access point?

*a. Peer-to-peer network

  • Extension to a wired network
  • Multiple Access Points
  • LAN-to-LAN Wireless network
  • Which wireless standard was in use when Wi-Fi first became popular?
  • 802.11a
  • *b. 802.11b

  • 802.11g
  • 802.11n
  • Which Wi-Fi standard uses dual-band technology and support simultaneous
  • connections on both the 2.4 GHz and 5 GHz bands?

*a. 802.11ac

  • 802.11g
  • 802.11i
  • 802.11n
  • What is the common name for the WPAN defined by IEEE 802.15.1?
  • RFID
  • Wi-Fi
  • *c. Bluetooth

  • Piconet
  • Which IEEE standard includes 802.1x RSN, and CCMP security features?
  • 802.11b
  • *b. 802.11i

  • 802.15
  • 802.16
  • Which technology provides networking capabilities over existing CAT3 cable and
  • can share the same wire as a standard telephone line?(Ethical Hacking and Countermeasures, Secure Network Operating Systems and Infrastructures (CEH), 2e EC-Council) (Test Bank, Correct Answer Marked with*) 1 / 3

  • CDPD
  • FRS
  • *c. HPNA

  • GPRS
  • Which of the following is a names a particular WLAN and must be used by all
  • devices in the same WLAN?

  • RADIUS
  • BSS
  • WPA2
  • *d. SSID

  • In which technique does an attacker acquire a trusted address that allows the attacker
  • to communicate with the access point?

*a. MAC sniffing

  • AP spoofing
  • Authentication attack
  • Disassociation attack
  • What do APs use to broadcast the SSID so users can locate the network?
  • BSS locators
  • shared key
  • *c. beacon frames

  • ICMP broadcasts
  • In the functioning of TKIP, what value is used as a session-based WEP key in the
  • second phase?

*a. TTAK

  • TSC
  • LEAP
  • MIC key
  • / 3

Chapter 2

  • Which technology uses an individual's unique physical traits to identify a valid user?
  • AI
  • Physical
  • Body
  • *d. Biometric

  • What is used to verify a user's identity and security clearance?

*a. Authentication

  • Access
  • Control
  • Identification
  • Which of the following contain a user's identity information and digital signature?
  • RSA tokens
  • *b. Digital certificates

  • Bio cards
  • PIN
  • Which of the following is a method to make traditional and memorized passwords
  • nonreusable?

  • smart cards
  • keyboard dynamics
  • *c. encrypted time stamp

  • signature dynamics analyzer
  • What procedure is used to translate information into code for secure transmission?

*a. Encryption

  • Steganography
  • Parsing
  • Hashing
  • Which security item is a physical object?
  • PIN
  • / 3

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

With its step-by-step guides, this document made learning easy. Definitely a impressive choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 29, 2025
Description:

Chapter 1 1. In which type of network can every computer communicate directly with the other computers on the same network without going through an access point? *a. Peer-to-peer network b. Extensi...

Unlock Now
$ 1.00