Exam 18: Wireless Network Security
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
the function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.
Free
(Short Answer)
4.7/5
(41)
Correct Answer:
extended service set (ESS)
the layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .
Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
A
Wireless networks, and the wireless devices that use them,
introduce a host of security problems over and above those found
in wired networks.
(True/False)
4.9/5
(27)
the PMK is used to generate the _________ which consists of three keys to be used for communication between a StA and AP after they have been mutually authenticated.
(Multiple Choice)
4.8/5
(32)
the first 802.11 standard to gain broad industry acceptance was _________.
(Multiple Choice)
4.9/5
(30)
Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
(Short Answer)
4.9/5
(37)
MAC spoofing occurs when an attacker is able to eavesdrop on
network traffic and identify the MAC address of a computer with
network privileges.
(True/False)
4.9/5
(28)
the _________ is used to ensure the confidentiality of the GtK and other key material in the 4-Way Handshake.
(Multiple Choice)
4.9/5
(30)
the smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.
(Short Answer)
4.8/5
(42)
the actual method of key generation depends on the details of the
authentication protocol used.
(True/False)
4.8/5
(34)
the __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.
(Short Answer)
4.9/5
(38)
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords
From legitimate users and then penetrate a wired network through a legitimate wireless access point.
(Multiple Choice)
4.8/5
(38)
the __________ layer is responsible for detecting errors and discarding any frames that contain errors.
(Short Answer)
4.8/5
(44)
the __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames.
(Multiple Choice)
4.9/5
(32)
A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer.
(Multiple Choice)
4.9/5
(38)
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
(Short Answer)
4.8/5
(38)
the use of 802.1X cannot prevent rogue access points and other
unauthorized devices from becoming insecure backdoors.
(True/False)
4.9/5
(36)
the __________ is the information that is delivered as a unit between MAC users.
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)