Exam 2: Wireless LAN Vulnerabilities
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
Because of the weaknesses of the implementation of WEP it is possible for an attacker to identify two packets derived from the same IV (called a(n) ____).
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
A
A wireless device is set to look for beacon frames from the AP. This is known as ____________________.
Free
(Short Answer)
4.8/5
(30)
Correct Answer:
scanning
To encrypt packets WEP can use only a 64-bit or ____-bit number.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
D
Describe the main characteristics of the shared key authentication method.
(Essay)
4.8/5
(38)
What are the differences between Dynamic WEP unicast and broadcast keys?
(Essay)
4.9/5
(27)
In WEP, RC4 uses a(n) ____________________ to create the keystream.
(Short Answer)
4.8/5
(34)
____ solves the weak initialization vector (IV) WEP problem by rotating the keys frequently.
(Multiple Choice)
4.9/5
(35)
The IEEE standard specifies that the access points and devices can hold up to four shared secret keys, one of which must be designated as the ____________________.
(Short Answer)
4.9/5
(43)
Changing the original text to a secret message using cryptography is known as ____.
(Multiple Choice)
4.8/5
(31)
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
(Short Answer)
4.9/5
(38)
When WEP is used for shared key authentication it is serving a dual function of encryption and authentication.
(True/False)
4.8/5
(31)
A stream cipher takes one character and replaces it with another character. This output is known as the ____.
(Multiple Choice)
4.8/5
(35)
Briefly explain how turning off the beaconing of the SSID affects roaming in a wireless network environment.
(Essay)
4.9/5
(29)
____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
(Multiple Choice)
4.9/5
(38)
Describe the main characteristics of the open system authentication method.
(Essay)
4.9/5
(38)
In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.
(Multiple Choice)
4.9/5
(31)
WEP relies on a secret key shared between a wireless client device and the access point.
(True/False)
4.8/5
(43)
With ____ scanning a wireless device simply listens for a beacon frame for a set period of time.
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)