Exam 7: Wireless Network Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.
Free
(True/False)
4.9/5
(36)
Correct Answer:
False
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake
Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
B
To certify interoperability for 802.11b products an industry consortium named the __________ was formed.
Free
(Essay)
5.0/5
(29)
Correct Answer:
Wireless Ethernet Compatibility Alliance (WECA)
Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.
(True/False)
4.8/5
(36)
The IEEE 802.11 protocol stack consists of the logical link control layer, the medium access control layer, and the _________ layer.
(Short Answer)
4.8/5
(34)
Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
(Short Answer)
4.8/5
(32)
The __________ layer is responsible for detecting errors and discarding any frames that contain errors.
(Short Answer)
4.8/5
(41)
Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.
(True/False)
4.9/5
(34)
The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PTK for data sessions.
(Short Answer)
4.8/5
(42)
The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium
(Multiple Choice)
4.8/5
(35)
The __________ is the information that is delivered as a unit between MAC users
(Multiple Choice)
4.8/5
(28)
MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.
(True/False)
4.7/5
(23)
____________ can occur when a company's wireless LAN or wireless access points to wired LANs in close proximity and may create overlapping transmission ranges.A user intending to connect to one LAN may unintentionally lock on to a wireless access point from a neighboring network
(Multiple Choice)
4.8/5
(40)
The actual method of key generation depends on the details of the authentication protocol used.
(True/False)
4.9/5
(37)
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities
(Multiple Choice)
4.7/5
(35)
Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
(True/False)
4.9/5
(41)
In simple terms, the wireless environment consists of three components that provide point of attack: the endpoint, the ______________, and the access point.
(Short Answer)
4.8/5
(39)
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point
(Multiple Choice)
4.8/5
(36)
__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.
(Short Answer)
4.8/5
(39)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)