Exam 8: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____ acts as the "base station" for the wireless network.

(Multiple Choice)
4.8/5
(25)
Match each term with the correct statement below.
A proprietary EAP method developed by Cisco Systems
SSID
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
TKIP
Correct Answer:
Verified
Premises:
Responses:
A proprietary EAP method developed by Cisco Systems
SSID
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
TKIP
A WPA encryption technology
Protected EAP
The process of documenting and then advertising the location of wireless LANs for others to use
War driving
Searching for wireless signals from an automobile or on foot using a portable computing device
Lightweight EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Initialization vector
A 24-bit value used in WEP that changes each time a packet is encrypted
War chalking
(Matching)
4.8/5
(33)

An ____ is an AP that is set up by an attacker.

(Multiple Choice)
4.8/5
(38)

Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.

(Multiple Choice)
4.9/5
(37)

Bluetooth devices are not backward compatible with previous versions.

(True/False)
4.8/5
(29)

Bluetooth is a ____ technology designed for data communication over short distances.

(Multiple Choice)
5.0/5
(43)

Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.

(Essay)
4.9/5
(42)

A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.

(Multiple Choice)
4.8/5
(31)

The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.

(Multiple Choice)
4.8/5
(38)

____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.

(Multiple Choice)
4.8/5
(35)

EAP request packets are issued by the ____.

(Multiple Choice)
4.8/5
(36)

____ requires mutual authentication used for WLAN encryption using Cisco client software.

(Multiple Choice)
4.7/5
(27)

____ allow a single access point to service different types of users.

(Multiple Choice)
4.9/5
(46)

____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.

(Multiple Choice)
4.9/5
(39)

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

(Multiple Choice)
4.8/5
(28)

If the EAP authentication is successful, a success packet is sent to the ____________________.

(Short Answer)
4.9/5
(27)

Describe a piconet.

(Essay)
4.9/5
(37)

A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

(Multiple Choice)
4.9/5
(28)

On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.

(Short Answer)
4.9/5
(36)

____ is the encryption protocol standard for WPA2.

(Multiple Choice)
4.7/5
(29)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)