Exam 8: Wireless LAN Security and Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Information security involves more than protecting the information itself.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

Employees pose only a small threat to networks.

Free
(True/False)
4.7/5
(36)
Correct Answer:
Verified

False

What are the three characteristics of information that must be protected by information security?

(Essay)
4.9/5
(38)

Which aspect of information security does WEP protect?

(Multiple Choice)
4.9/5
(46)

A ____ is not malicious but often seeks to expose security flaws.

(Multiple Choice)
4.9/5
(37)

Describe the five steps in the process of WEP encryption.

(Essay)
4.9/5
(44)

RC4 is a ____ cipher that accepts keys up to 128 bits in length.

(Multiple Choice)
4.9/5
(40)

A WEP key can be a passphrase created by entering ____ ASCII characters.

(Multiple Choice)
4.8/5
(30)

In a brute force attack, what key combination would follow 00001?

(Multiple Choice)
4.8/5
(40)

Briefly describe cryptography and discuss its history.

(Essay)
4.8/5
(45)

Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.

(Short Answer)
4.8/5
(39)

The term _________________________ is frequently used to describe the tasks of guarding information that is in a digital format.

(Short Answer)
4.9/5
(36)

A ____ attack on WEP involves viewing collisions to derive plaintext values.

(Multiple Choice)
4.8/5
(35)

Briefly describe the goal of InfraGard.

(Essay)
4.8/5
(39)

Describe open system authentication.

(Essay)
4.9/5
(41)

____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.

(Multiple Choice)
4.8/5
(26)

What is a dictionary attack?

(Essay)
4.8/5
(33)

____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

(Multiple Choice)
4.7/5
(43)

Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)