Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER 9 ASSESSMENT

  1. Network discovery tools are a set of tools made specifically for hackers.
    1. True
    2. False
  2. Programs such as Kismet can perform which of the following functions?
    1. Wardriving WLAN discovery
    2. Rogue access point detection
    3. Low-cost intrusion detection system
    4. SSID decloaking
    5. All of the above
  3. Which of the following most accurately describes penetration testing, or pentesting?
    1. To truly gauge security capabilities, pentesting should be done without notifying network administrators.
    2. Pentesting is illegal and immoral.
    3. Pentesting is an important aspect of identifying vulnerabilities and hardening defenses.
    4. Pentesting helps you discover Wi-Fi coverage gaps.
  4. Which of the following describes brute-force attacks?
    1. They use torture to make people ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733