Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER 8 ASSESSMENT

  1. For larger networks or campuses, centralized control greatly simplifies design and tends to work better due the time savings offered with regard to maintenance.
    1. True
    2. False
  2. Which of the following KPIs is unaffected by the use of VoIP or VoWLAN?
    1. Packet loss
    2. Latency
    3. Jitter
    4. Security
    5. Availability
  3. Wi-Fi guest access can include which of the following types of access?
    1. Open access
    2. Common password
    3. Provisioned password
    4. No guest access allowed
    5. All of the above
  4. Extensible Authentication Protocol does which of the following?
    1. Protects authentication credentials
    2. Can be used over a LAN to securely connect to a RADIUS server
    3. Is independent of the authentication method used
    4. All of the above
  5. Discovery protocols are great for IT personnel ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733