Exam 7: Wireless Network Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.
(Short Answer)
4.8/5
(38)
In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.
(Short Answer)
4.8/5
(29)
The specification of a protocol along with the chosen key length is known as a __________
(Multiple Choice)
4.8/5
(35)
A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer
(Multiple Choice)
4.7/5
(37)
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________
(Multiple Choice)
4.8/5
(26)
The first 802.11 standard to gain broad industry acceptance was _________
(Multiple Choice)
4.8/5
(38)
An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.
(Short Answer)
4.9/5
(39)
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
(Short Answer)
4.7/5
(37)
The term used for certified 802.11b products is ___________
(Multiple Choice)
4.7/5
(32)
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
(True/False)
4.8/5
(34)
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.
(Short Answer)
4.9/5
(31)
The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.
(Short Answer)
4.8/5
(29)
The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.
(True/False)
4.9/5
(41)
The __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames
(Multiple Choice)
4.9/5
(30)
___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing
(Multiple Choice)
4.8/5
(19)
The MPDU authentication phase consists of three phases.They are: connect to AS, EAP exchange and _________ .
(Short Answer)
4.9/5
(28)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)