166.
What is a client-to-client wireless connection called?
- A.Infrastructure
- B.Client-server
- C.Peer-to-peer
- D.Ad hoc
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
When two clients attach to each other in a wireless setting, it is known as an ad hoc network. |
167.
When a wireless client is attached to an access point, it is known as which of the
following?
- A.Infrastructure
- B.Client-server
- C.Peer-to-peer
- D.Ad hoc
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
In an infrastructure network the client attaches directly to an access point instead of another client. |
168.
Bluesnarfing is used to perform what type of attack?
- A.Send spam text messages.
- B.Read information from a device.
- C.Deposit malware on a system.
- D.Distribute files onto a system.
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Bluesnarfing is used to read information from a Bluetooth-enabled device. |
169.
Monitor mode is used by wireless cards to do what?
- A.Capture traffic from an associated wireless access point.
- B.Capture information from ad hoc networks.
- C.Capture information about wireless networks.
- D.Capture traffic from access points.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Monitor mode is a feature supported by wireless network cards that allows the capturing of wireless traffic from unassociated wireless networks. |
170.
A honeyspot is designed to do what?
- A.Look for patterns of known attacks.
- B.Look for deviations from known traffic patterns.
- C.Attract victims to connect to it.
- D.Analyze attacks patterns
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Honeyspots are intended to attract victims to attach to it with the intention of gathering information. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40