Exam 8: Wireless LAN Security and Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe one trend that is making security increasingly difficult.

(Essay)
4.8/5
(38)

MAC address filtering ____.

(Multiple Choice)
4.8/5
(43)

Cryptography is a new invention of the 20th Century.

(True/False)
4.8/5
(34)

According to the IEEE 802.11 cryptography objectives, how strong should WEP be?

(Multiple Choice)
4.9/5
(42)

What is a cracker?

(Essay)
4.7/5
(36)

In WEP, the CRC generates a(n) ____ based on the contents of the text.

(Multiple Choice)
4.8/5
(38)

Wireless DoS attacks are exactly the same as wired DoS attacks.

(True/False)
4.7/5
(39)

Describe at least four weaknesses of open system authentication.

(Essay)
4.9/5
(41)

In a 64-bit packet sent using WEP, how many bits are actually encrypted?

(Multiple Choice)
4.9/5
(34)

When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.

(Multiple Choice)
4.8/5
(37)

____ is another name for open systems authentication.

(Multiple Choice)
4.8/5
(44)
Match each term with the correct statement below.
attacker floods the radio frequency spectrum with noise
cipher
person who has been hired to break into a computer and steal information
jam
series of 1's and 0's equal in length to the text plus the ICV
script kiddies
Correct Answer:
Verified
Premises:
Responses:
attacker floods the radio frequency spectrum with noise
cipher
person who has been hired to break into a computer and steal information
jam
series of 1's and 0's equal in length to the text plus the ICV
script kiddies
key value that is used to encrypt wireless data transmissions when they are sent
computer spy
person who violates system security with malicious intent
cracker
encryption algorithm
hacker
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
keystream
limit a user's admission to the access point
filter
unskilled or novice users who break into computer systems with malicious intent
default key
(Matching)
4.7/5
(39)

MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.

(Multiple Choice)
4.8/5
(38)

While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.

(Short Answer)
4.8/5
(43)

Describe a man-in-the-middle attack.

(Essay)
4.8/5
(41)

In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.

(Short Answer)
4.9/5
(41)

A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.

(Multiple Choice)
4.9/5
(32)

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

(Multiple Choice)
4.9/5
(27)

A standard personal computer can easily create over ____ possible password combinations per second.

(Multiple Choice)
4.8/5
(41)

Which type of attacker typically has a high skill level?

(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)