Exam 8: Wireless LAN Security and Vulnerabilities
Exam 1: Its a Wireless World42 Questions
Exam 2: Wireless LAN Devices and Standards42 Questions
Exam 3: How Wireless Works42 Questions
Exam 4: IEEE 80211 Physical Layer Standards42 Questions
Exam 5: IEEE 80211 Media Access Control and Network Layer Standards42 Questions
Exam 6: Planning and Deploying a Wireless LAN42 Questions
Exam 7: Conducting a Site Survey42 Questions
Exam 8: Wireless LAN Security and Vulnerabilities42 Questions
Exam 9: Implementing Wireless Lan Security42 Questions
Exam 10: Managing a Wireless LAN42 Questions
Exam 11: Network Settings and Wireless LAN Troubleshooting42 Questions
Exam 12: Personal, Metropolitan, and Wide Area Wireless Networks42 Questions
Select questions type
According to the IEEE 802.11 cryptography objectives, how strong should WEP be?
(Multiple Choice)
4.9/5
(42)
In WEP, the CRC generates a(n) ____ based on the contents of the text.
(Multiple Choice)
4.8/5
(38)
In a 64-bit packet sent using WEP, how many bits are actually encrypted?
(Multiple Choice)
4.9/5
(34)
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.
(Multiple Choice)
4.8/5
(37)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(39)
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.
(Multiple Choice)
4.8/5
(38)
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
(Short Answer)
4.8/5
(43)
In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.
(Short Answer)
4.9/5
(41)
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.
(Multiple Choice)
4.9/5
(32)
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
(Multiple Choice)
4.9/5
(27)
A standard personal computer can easily create over ____ possible password combinations per second.
(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)