Exam 18: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.

Free
(Short Answer)
4.7/5
(41)
Correct Answer:
Verified

extended service set (ESS)

the layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .

Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
Verified

A

Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.

(True/False)
4.9/5
(27)

the PMK is used to generate the _________ which consists of three keys to be used for communication between a StA and AP after they have been mutually authenticated.

(Multiple Choice)
4.8/5
(32)

the first 802.11 standard to gain broad industry acceptance was _________.

(Multiple Choice)
4.9/5
(30)

Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.

(Short Answer)
4.9/5
(37)

MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.

(True/False)
4.9/5
(28)

the _________ is used to ensure the confidentiality of the GtK and other key material in the 4-Way Handshake.

(Multiple Choice)
4.9/5
(30)

the smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.

(Short Answer)
4.8/5
(42)

the actual method of key generation depends on the details of the authentication protocol used.

(True/False)
4.8/5
(34)

the __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.

(Short Answer)
4.9/5
(38)

In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords From legitimate users and then penetrate a wired network through a legitimate wireless access point.

(Multiple Choice)
4.8/5
(38)

the __________ layer is responsible for detecting errors and discarding any frames that contain errors.

(Short Answer)
4.8/5
(44)

the __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames.

(Multiple Choice)
4.9/5
(32)

A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer.

(Multiple Choice)
4.9/5
(38)

A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

(Short Answer)
4.8/5
(38)

the use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.

(True/False)
4.9/5
(36)

Sensors and robots are not vulnerable to physical attacks.

(True/False)
4.8/5
(30)

the __________ is the information that is delivered as a unit between MAC users.

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)