CWNA Wireless Network Administrator - Question List

Select how would you like to study

111. Which of the following attack is MAC filtering susceptible to?
  1. MAC re-injection
  2. ARP poisoning
  3. Spoofing
  4. IV Collisions
112. Which of these attacks cannot be detected by a WIDS?
  1. MAC spoofing
  2. Protocol analyzer
  3. Rogue access point
  4. Association flood
113. Which of the following can be used to mitigate the threat from a rogue access point?
  1. WIDS
  2. WIPS
  3. TKIP/RC4
  4. WINS
114. Which of the following is not a label that WIPS uses to classify an 802.11 device?
  1. Infrastructure
  2. Known
  3. Disabled
  4. Rogue
115. Which of the following is a spectrum management technology that uses a decentralized approach to adjust access point power and channel settings?
  1. Transmit power control
  2. Dynamic frequency selection
  3. RFSM
  4. GFSK

Select how would you like to study