Exam 5: Wireless Security Models
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
In 802.1x, the supplicant sends the request to a(n) ____ that serves as an intermediary device.
(Multiple Choice)
4.9/5
(32)
In 802.1x, the ____ is the wireless device that requires secure network access.
(Multiple Choice)
4.9/5
(29)
____ uses dynamic negotiation of authentication and encryption algorithms between access points and wireless devices.
(Multiple Choice)
4.8/5
(39)
An 802.1x ____ only job is to verify the authentication of devices.
(Multiple Choice)
4.8/5
(30)
AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.
(Short Answer)
4.7/5
(42)
What are some of the reasons why turning off SSID beaconing provides a limited degree of security?
(Essay)
4.8/5
(37)
The ____ standard addresses the two weaknesses of wireless networks: encryption and authentication.
(Multiple Choice)
4.7/5
(35)
When using the transitional security model, open system authentication should be used instead of shared key authentication.
(True/False)
4.9/5
(31)
PSK keys are automatically authenticated between devices after a specified period known as the ____.
(Multiple Choice)
4.8/5
(35)
PSK requires that a key (also called a(n) ____) be entered in both the access point and the wireless devices.
(Multiple Choice)
4.8/5
(30)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(31)
The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.
(Multiple Choice)
4.9/5
(37)
What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
(Essay)
4.8/5
(36)
AES is designed to be an encryption technique that is secure from attacks.
(True/False)
4.9/5
(30)
The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.
(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)