Exam 9: Implementing Wireless Lan Security
Exam 1: Its a Wireless World42 Questions
Exam 2: Wireless LAN Devices and Standards42 Questions
Exam 3: How Wireless Works42 Questions
Exam 4: IEEE 80211 Physical Layer Standards42 Questions
Exam 5: IEEE 80211 Media Access Control and Network Layer Standards42 Questions
Exam 6: Planning and Deploying a Wireless LAN42 Questions
Exam 7: Conducting a Site Survey42 Questions
Exam 8: Wireless LAN Security and Vulnerabilities42 Questions
Exam 9: Implementing Wireless Lan Security42 Questions
Exam 10: Managing a Wireless LAN42 Questions
Exam 11: Network Settings and Wireless LAN Troubleshooting42 Questions
Exam 12: Personal, Metropolitan, and Wide Area Wireless Networks42 Questions
Select questions type
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
C
Describe Advanced Encryption Standard (AES).
Free
(Essay)
4.7/5
(44)
Correct Answer:
AES is a block cipher that uses the same key for both encryption and decryption. With AES, bits are encrypted in blocks of plaintext that are calculated independently, rather than a keystream acting across a plaintext data input stream. AES has a block size of 128 bits with three possible key lengths: 128, 192, and 256 bits as specified in the AES standard. For the WPA2/802.11i implementation of AES, a 128-bit key length is used. AES encryption includes four stages that make up one round. Each round is then iterated 10, 12, or 14 times depending upon the bit-key size. For the WPA2/802.11i implementation of AES, each round is iterated 10 times.
The personal security model is intended for settings in which a(n) ____ is unavailable.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
(Essay)
4.8/5
(33)
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
(Essay)
4.9/5
(37)
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.
(Multiple Choice)
4.8/5
(30)
The block cipher used in 802.11i is the Data Encryption Standard (DES).
(True/False)
4.8/5
(33)
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
(True/False)
4.7/5
(36)
____ authentication is used in the enterprise security model using WPA and WPA2.
(Multiple Choice)
4.9/5
(36)
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
(Essay)
4.8/5
(32)
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
(Short Answer)
4.8/5
(35)
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.
(Multiple Choice)
4.8/5
(36)
What should a business do if the best possible security model cannot be implemented?
(Essay)
4.9/5
(36)
The ____ wireless security standard provides a low level of security.
(Multiple Choice)
4.7/5
(31)
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
(True/False)
4.9/5
(44)
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.
(Multiple Choice)
4.8/5
(38)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(36)
____ is considered to be the "heart and soul" of WPA security.
(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)