Exam 8: Wireless LAN Security and Vulnerabilities
Exam 1: Its a Wireless World42 Questions
Exam 2: Wireless LAN Devices and Standards42 Questions
Exam 3: How Wireless Works42 Questions
Exam 4: IEEE 80211 Physical Layer Standards42 Questions
Exam 5: IEEE 80211 Media Access Control and Network Layer Standards42 Questions
Exam 6: Planning and Deploying a Wireless LAN42 Questions
Exam 7: Conducting a Site Survey42 Questions
Exam 8: Wireless LAN Security and Vulnerabilities42 Questions
Exam 9: Implementing Wireless Lan Security42 Questions
Exam 10: Managing a Wireless LAN42 Questions
Exam 11: Network Settings and Wireless LAN Troubleshooting42 Questions
Exam 12: Personal, Metropolitan, and Wide Area Wireless Networks42 Questions
Select questions type
Information security involves more than protecting the information itself.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
Employees pose only a small threat to networks.
Free
(True/False)
4.7/5
(36)
Correct Answer:
False
What are the three characteristics of information that must be protected by information security?
(Essay)
4.9/5
(38)
A ____ is not malicious but often seeks to expose security flaws.
(Multiple Choice)
4.9/5
(37)
RC4 is a ____ cipher that accepts keys up to 128 bits in length.
(Multiple Choice)
4.9/5
(40)
A WEP key can be a passphrase created by entering ____ ASCII characters.
(Multiple Choice)
4.8/5
(30)
In a brute force attack, what key combination would follow 00001?
(Multiple Choice)
4.8/5
(40)
Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.
(Short Answer)
4.8/5
(39)
The term _________________________ is frequently used to describe the tasks of guarding information that is in a digital format.
(Short Answer)
4.9/5
(36)
A ____ attack on WEP involves viewing collisions to derive plaintext values.
(Multiple Choice)
4.8/5
(35)
____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.
(Multiple Choice)
4.8/5
(26)
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.
(Multiple Choice)
4.7/5
(43)
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
(True/False)
4.9/5
(39)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)