Exam 2: Wireless LAN Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

A wireless device is set to look for beacon frames from the AP. This is known as ____________________.

Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Verified

scanning

To encrypt packets WEP can use only a 64-bit or ____-bit number.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

D

What is a MAC address?

(Essay)
4.9/5
(38)

Describe the main characteristics of the shared key authentication method.

(Essay)
4.8/5
(38)

What are the differences between Dynamic WEP unicast and broadcast keys?

(Essay)
4.9/5
(27)

In WEP, RC4 uses a(n) ____________________ to create the keystream.

(Short Answer)
4.8/5
(34)

WEP2 uses a different authentication system known as ____.

(Multiple Choice)
4.9/5
(35)

____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.

(Multiple Choice)
4.9/5
(35)

The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.

(Short Answer)
4.9/5
(43)

Changing the original text to a secret message using cryptography is known as ____.

(Multiple Choice)
4.8/5
(31)

____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.

(Short Answer)
4.9/5
(38)

When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.

(True/False)
4.8/5
(31)

A stream cipher takes one character and replaces it with another character. This output is known as the ____.

(Multiple Choice)
4.8/5
(35)

Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.

(Essay)
4.9/5
(29)

____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

(Multiple Choice)
4.9/5
(38)

Describe the main characteristics of the open system authentication method.

(Essay)
4.9/5
(38)

In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

(Multiple Choice)
4.9/5
(31)

WEP relies on a secret key shared between a wireless client device and the access point.

(True/False)
4.8/5
(43)

With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)