Exam 5: Wireless Security Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The block cipher used in 802.11i is the ____________________.

Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Verified

Advanced Encryption Standard (AES)
Advanced Encryption Standard
AES

WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

False

The ____ model is designed for single users or small office/home office (SOHO) settings of generally 10 or fewer wireless devices.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.

(Multiple Choice)
4.9/5
(41)

In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.

(Multiple Choice)
4.8/5
(36)

The original PSK passphrase is mathematically manipulated (known as ____________________) 4,096 times before it is transmitted.

(Short Answer)
4.9/5
(37)

Pre-authentication allows for faster roaming between access points.

(True/False)
4.9/5
(41)

What are some of the PSK key management weaknesses?

(Essay)
4.7/5
(31)

WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.

(Short Answer)
4.9/5
(33)

Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.

(Multiple Choice)
4.8/5
(32)

How do TKIP and MIC perform encryption in the WPA personal security model?

(Essay)
4.9/5
(33)

IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.

(Multiple Choice)
4.7/5
(27)

PSK passphrases of fewer than 20 characters can be subject to ____ attacks.

(Multiple Choice)
4.8/5
(37)

The most robust level of security that can be achieved today for wireless LANs is using the ____ model.

(Multiple Choice)
4.9/5
(35)

PSK keys are automatically changed (called ____).

(Multiple Choice)
4.9/5
(35)

IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.

(Multiple Choice)
4.8/5
(36)

WPA replaces WEP with an encryption technology called ____________________.

(Short Answer)
4.9/5
(34)

What are the benefits of limiting the maximum number of DHCP users?

(Essay)
4.8/5
(33)

____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.

(Multiple Choice)
4.8/5
(35)

It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)