Exam 8: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe how wireless VLANs can be configured.

Free
(Essay)
4.8/5
(35)
Correct Answer:
Verified

Wireless VLANs can be configured in one of two ways. The difference depends on which device separates the packets and directs them to different networks. In one configuration, separating packets in this wireless VLAN is done by the switch. Each AP is connected to a separate port on the switch and represents a different VLAN. As packets destined for the wireless LAN arrive at the switch, the switch separates the packets and sends them to the appropriate AP (VLAN). A more flexible approach is to have the AP responsible for separating the packets. The key to this configuration is that different VLANs are transmitted by the AP on different SSIDs. This enables only the clients associated with a specific VLAN to receive those packets. Access points that support wireless VLANs may support 16 or more multiple SSIDs (and thus multiple VLANs).

The SSID can generally be any alphanumeric string from 2 to ___ characters.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

When a wireless device looks for beacon frames it is known as ____________________.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

scanning

____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.

(Short Answer)
4.9/5
(37)

Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.

(True/False)
4.7/5
(27)

Discuss the different types of interference one might encounter using wireless devices.

(Essay)
4.9/5
(26)

Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.

(True/False)
4.9/5
(33)

Explain what war driving is.

(Essay)
4.8/5
(31)

____ is designed to detect any changes in a packet, whether accidental or intentional.

(Multiple Choice)
4.8/5
(30)

What are the four types of packets used by EAP?

(Essay)
5.0/5
(26)

When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.

(Short Answer)
4.8/5
(37)

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

(Multiple Choice)
4.8/5
(39)

Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.

(True/False)
4.8/5
(39)

Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.

(Multiple Choice)
4.8/5
(26)

____ is a framework for transporting authentication protocols instead of the authentication protocol itself.

(Multiple Choice)
4.8/5
(25)

Identify and describe two types of wireless probes.

(Essay)
4.9/5
(32)

Explain why it is important to be able to control the power level at which the WLAN transmits.

(Essay)
4.9/5
(35)

A group of piconets in which connections exist between different piconets is called a ____.

(Multiple Choice)
4.8/5
(30)

List and describe the major parts of an access point.

(Essay)
4.8/5
(45)

When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.

(Multiple Choice)
4.8/5
(44)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)