Exam 9: Implementing Wireless Lan Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The 802.11i standard addresses both ____.

(Multiple Choice)
4.9/5
(25)

How long is the per-packet key used in TKIP?

(Multiple Choice)
4.8/5
(31)

WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.

(True/False)
4.9/5
(29)

Describe the 802.1x authentication procedure.

(Essay)
4.8/5
(32)

The ____ method of encryption is used in a personal security model.

(Multiple Choice)
4.8/5
(36)

____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

(Short Answer)
4.7/5
(44)

____ replaces CRC in WPA.

(Multiple Choice)
4.8/5
(35)

What is a wireless gateway?

(Essay)
4.8/5
(40)

What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

(Multiple Choice)
4.8/5
(37)

Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.

(Multiple Choice)
4.8/5
(40)

What is the first step in implementing an interim security model?

(Multiple Choice)
4.8/5
(41)

What are the ways in which captive portals are used?

(Essay)
4.7/5
(29)

A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.

(True/False)
4.7/5
(46)

Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.

(Essay)
4.8/5
(32)

A ____ VPN is a user-to-LAN connection used by remote users.

(Multiple Choice)
4.8/5
(35)

What authentication system did the proposed WEP2 standard use?

(Multiple Choice)
4.9/5
(38)

Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.

(Multiple Choice)
4.8/5
(41)

Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.

(Multiple Choice)
4.9/5
(39)

The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.

(Short Answer)
4.7/5
(36)

What security technology was most recently introduced?

(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)