Home
You may like this!
166.
What is a client-to-client wireless connection called?
  • A.
    Infrastructure
  • B.
    Client-server
  • C.
    Peer-to-peer
  • D.
    Ad hoc
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
When two clients attach to each other in a wireless setting, it is known as an ad hoc network.
Report
Name Email  
167.
When a wireless client is attached to an access point, it is known as which of the following?
  • A.
    Infrastructure
  • B.
    Client-server
  • C.
    Peer-to-peer
  • D.
    Ad hoc
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
In an infrastructure network the client attaches directly to an access point instead of another client.
Report
Name Email  
168.
Bluesnarfing is used to perform what type of attack?
  • A.
    Send spam text messages.
  • B.
    Read information from a device.
  • C.
    Deposit malware on a system.
  • D.
    Distribute files onto a system.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Bluesnarfing is used to read information from a Bluetooth-enabled device.
Report
Name Email  
169.
Monitor mode is used by wireless cards to do what?
  • A.
    Capture traffic from an associated wireless access point.
  • B.
    Capture information from ad hoc networks.
  • C.
    Capture information about wireless networks.
  • D.
    Capture traffic from access points.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Monitor mode is a feature supported by wireless network cards that allows the capturing of wireless traffic from unassociated wireless networks.
Report
Name Email  
170.
A honeyspot is designed to do what?
  • A.
    Look for patterns of known attacks.
  • B.
    Look for deviations from known traffic patterns.
  • C.
    Attract victims to connect to it.
  • D.
    Analyze attacks patterns
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Honeyspots are intended to attract victims to attach to it with the intention of gathering information.
Report
Name Email