Exam 7: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

B

To certify interoperability for 802.11b products an industry consortium named the __________ was formed.

Free
(Essay)
5.0/5
(29)
Correct Answer:
Verified

Wireless Ethernet Compatibility Alliance (WECA)

Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.

(True/False)
4.8/5
(36)

The master session key is also known as the __________ key

(Multiple Choice)
4.8/5
(33)

The IEEE 802.11 protocol stack consists of the logical link control layer, the medium access control layer, and the _________ layer.

(Short Answer)
4.8/5
(34)

Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.

(Short Answer)
4.8/5
(32)

The __________ layer is responsible for detecting errors and discarding any frames that contain errors.

(Short Answer)
4.8/5
(41)

Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.

(True/False)
4.9/5
(34)

The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PTK for data sessions.

(Short Answer)
4.8/5
(42)

The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium

(Multiple Choice)
4.8/5
(35)

The __________ is the information that is delivered as a unit between MAC users

(Multiple Choice)
4.8/5
(28)

MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.

(True/False)
4.7/5
(23)

____________ can occur when a company's wireless LAN or wireless access points to wired LANs in close proximity and may create overlapping transmission ranges.A user intending to connect to one LAN may unintentionally lock on to a wireless access point from a neighboring network

(Multiple Choice)
4.8/5
(40)

The actual method of key generation depends on the details of the authentication protocol used.

(True/False)
4.9/5
(37)

The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities

(Multiple Choice)
4.7/5
(35)

Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.

(True/False)
4.9/5
(41)

In simple terms, the wireless environment consists of three components that provide point of attack: the endpoint, the ______________, and the access point.

(Short Answer)
4.8/5
(39)

In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point

(Multiple Choice)
4.8/5
(36)

__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.

(Short Answer)
4.8/5
(39)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)