Exam 7: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.

(Short Answer)
4.8/5
(38)

In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.

(Short Answer)
4.8/5
(29)

The DS can be a switch, a wired network, or a wireless network.

(True/False)
4.7/5
(38)

The specification of a protocol along with the chosen key length is known as a __________

(Multiple Choice)
4.8/5
(35)

A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer

(Multiple Choice)
4.7/5
(37)

The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________

(Multiple Choice)
4.8/5
(26)

The first 802.11 standard to gain broad industry acceptance was _________

(Multiple Choice)
4.8/5
(38)

An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.

(Short Answer)
4.9/5
(39)

The pairwise master key is derived from the group key.

(True/False)
4.8/5
(41)

A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

(Short Answer)
4.7/5
(37)

The term used for certified 802.11b products is ___________

(Multiple Choice)
4.7/5
(32)

The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.

(True/False)
4.8/5
(34)

The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.

(Short Answer)
4.9/5
(31)

The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.

(Short Answer)
4.8/5
(29)

The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.

(True/False)
4.9/5
(41)

Sensors and robots, are not vulnerable to physical attacks.

(True/False)
4.8/5
(35)

The __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames

(Multiple Choice)
4.9/5
(30)

IEEE 802.11 is a standard for wireless LANs.

(True/False)
4.8/5
(36)

___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing

(Multiple Choice)
4.8/5
(19)

The MPDU authentication phase consists of three phases.They are: connect to AS, EAP exchange and _________ .

(Short Answer)
4.9/5
(28)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)