Exam 11: Hacking Wireless Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What protocol improves WPA encryption by adding Message Integrity Checks,Extended Initialization Vectors,Per-packet key mixing,and a Re-keying mechanism to improve encryption?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Which of the following defines how data is placed on a carrier signal?

Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
Verified

A

What is WEP,and is it an acceptable way to secure wireless networks?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

Wired Equivalent Privacy (WEP),part of the 802.11b standard,was developed to encrypt data traversing a wireless network.For some time,it gave many security professionals a false sense of security that wireless technology could be just as safe as wired networks.Unfortunately,WEP has been torn to shreds by security professionals,professors from major universities,and hackers who post ways to crack WEP encryption.Some argue that WEP is still better than no security at all,and when it's combined with the security of a virtual private network (VPN),they claim that WEP works well for home users or small businesses.Still,many saw a need for a better way to protect WLANs.

What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?

(Multiple Choice)
4.8/5
(36)

Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?

(Multiple Choice)
4.8/5
(28)

Which frequency band is used by commercial AM radio stations?

(Multiple Choice)
4.9/5
(34)

In 802.1X,what is an authentication server?

(Essay)
4.9/5
(30)

What is frequency-hopping spread spectrum (FHSS)?

(Essay)
4.9/5
(32)

Match each item with a statement below. -Data is spread across a large-frequency bandwidth instead of traveling across just one frequency band

(Multiple Choice)
4.8/5
(36)

Which of the following protocols is an enhancement to PPP,and was designed to allow a company to select its authentication method?

(Multiple Choice)
4.9/5
(39)

CSMA/CD is implemented at the data link layer on wireless networks.

(True/False)
4.8/5
(39)

Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network?

(Multiple Choice)
4.9/5
(45)

Match each item with a statement below. -A technology that uses microwave radio band frequencies to transmit data

(Multiple Choice)
4.8/5
(33)

What is the Point-to-Point Protocol and how is it utilized?

(Essay)
4.9/5
(37)

What is a basic service set (BSS)?

(Essay)
4.8/5
(25)

What is the function of a "working group" within the IEEE?

(Essay)
4.9/5
(45)

Which of the following EAP methods uses TLS to authenticate the server to the client,but not the client to the server?

(Multiple Choice)
4.9/5
(38)

Routers are the bridge between wired and wireless networks.

(True/False)
4.8/5
(33)

Which IEEE standard can achieve a throughput of 54 Mbps?

(Multiple Choice)
4.8/5
(29)

What are the basic components of a wireless network?

(Essay)
4.9/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)