Exam 5: Wireless Security Models
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
The block cipher used in 802.11i is the ____________________.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Advanced Encryption Standard (AES)
Advanced Encryption Standard
AES
WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.
Free
(True/False)
4.9/5
(38)
Correct Answer:
False
The ____ model is designed for single users or small office/home office (SOHO) settings of generally 10 or fewer wireless devices.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
B
WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.
(Multiple Choice)
4.9/5
(41)
In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.
(Multiple Choice)
4.8/5
(36)
The original PSK passphrase is mathematically manipulated (known as ____________________) 4,096 times before it is transmitted.
(Short Answer)
4.9/5
(37)
Pre-authentication allows for faster roaming between access points.
(True/False)
4.9/5
(41)
WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.
(Short Answer)
4.9/5
(33)
Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.
(Multiple Choice)
4.8/5
(32)
How do TKIP and MIC perform encryption in the WPA personal security model?
(Essay)
4.9/5
(33)
IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.
(Multiple Choice)
4.7/5
(27)
PSK passphrases of fewer than 20 characters can be subject to ____ attacks.
(Multiple Choice)
4.8/5
(37)
The most robust level of security that can be achieved today for wireless LANs is using the ____ model.
(Multiple Choice)
4.9/5
(35)
IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.
(Multiple Choice)
4.8/5
(36)
WPA replaces WEP with an encryption technology called ____________________.
(Short Answer)
4.9/5
(34)
____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
(Multiple Choice)
4.8/5
(35)
It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES.
(True/False)
4.8/5
(35)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)