Exam 18: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

to certify interoperability for 802.11b products an industry consortium named the __________ was formed.

(Essay)
4.9/5
(36)

In simple terms, the wireless environment consists of three components that provide point of attack: the endpoint, the ______________, and the access point.

(Short Answer)
4.8/5
(36)

the MPDU exchange for distributing pairwise keys is known as the _________ which the StA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PtK for data sessions.

(Short Answer)
4.9/5
(35)

the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.

(True/False)
4.8/5
(30)

You should allow only specific computers to access your wireless network.

(True/False)
4.8/5
(26)

the DS can be a switch, a wired network, or a wireless network.

(True/False)
4.8/5
(31)

the principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.

(True/False)
4.9/5
(39)

__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.

(Short Answer)
4.8/5
(46)

the pairwise master key is derived from the group key.

(True/False)
4.9/5
(34)

___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing.

(Multiple Choice)
4.7/5
(46)

the term used for certified 802.11b products is ___________ .

(Multiple Choice)
4.8/5
(39)

IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.

(True/False)
4.8/5
(38)

the master session key is also known as the __________ key.

(Multiple Choice)
4.8/5
(36)

the IEEE 802.11 protocol stack consists of the logical link control layer, the medium access control layer, and the _________ layer.

(Short Answer)
4.8/5
(32)

the integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

(True/False)
4.8/5
(36)

the specification of a protocol along with the chosen key length is known as a __________ .

(Multiple Choice)
5.0/5
(28)

IEEE 802.11i is the standard for wireless LAN security.

(True/False)
4.9/5
(37)

Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.

(True/False)
4.8/5
(33)

the main threat involving wireless access points is unauthorized access to the network.the principal approach for preventing success is the __________ standard for port-based network access control.

(Short Answer)
4.8/5
(39)

Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.

(True/False)
4.8/5
(27)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)