Exam 9: Implementing Wireless Lan Security
Exam 1: Its a Wireless World42 Questions
Exam 2: Wireless LAN Devices and Standards42 Questions
Exam 3: How Wireless Works42 Questions
Exam 4: IEEE 80211 Physical Layer Standards42 Questions
Exam 5: IEEE 80211 Media Access Control and Network Layer Standards42 Questions
Exam 6: Planning and Deploying a Wireless LAN42 Questions
Exam 7: Conducting a Site Survey42 Questions
Exam 8: Wireless LAN Security and Vulnerabilities42 Questions
Exam 9: Implementing Wireless Lan Security42 Questions
Exam 10: Managing a Wireless LAN42 Questions
Exam 11: Network Settings and Wireless LAN Troubleshooting42 Questions
Exam 12: Personal, Metropolitan, and Wide Area Wireless Networks42 Questions
Select questions type
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
(True/False)
4.9/5
(29)
The ____ method of encryption is used in a personal security model.
(Multiple Choice)
4.8/5
(36)
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
(Short Answer)
4.7/5
(44)
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?
(Multiple Choice)
4.8/5
(37)
Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.
(Multiple Choice)
4.8/5
(40)
What is the first step in implementing an interim security model?
(Multiple Choice)
4.8/5
(41)
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
(True/False)
4.7/5
(46)
Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
(Essay)
4.8/5
(32)
A ____ VPN is a user-to-LAN connection used by remote users.
(Multiple Choice)
4.8/5
(35)
What authentication system did the proposed WEP2 standard use?
(Multiple Choice)
4.9/5
(38)
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.
(Multiple Choice)
4.8/5
(41)
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.
(Multiple Choice)
4.9/5
(39)
The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.
(Short Answer)
4.7/5
(36)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)