Exam 8: Secure Wireless Authentication
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
____ measures the resources a user consumes during each network session.
(Multiple Choice)
4.8/5
(36)
Certificates are issued by a trusted third party called a(n) ____________________.
(Short Answer)
4.9/5
(48)
The MKs are used for access point to wireless device transmissions, or unicast transmissions.
(True/False)
4.8/5
(42)
In public key cryptography, the ____ key encrypts the message.
(Multiple Choice)
4.9/5
(33)
____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.
(Multiple Choice)
5.0/5
(40)
What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?
(Essay)
4.8/5
(30)
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.
(Multiple Choice)
5.0/5
(37)
Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
(True/False)
4.8/5
(39)
The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.
(Short Answer)
4.8/5
(38)
EAP was originally defined for dial-up access but is now used for both wired and wireless access.
(True/False)
4.8/5
(36)
What are the two types of device authentication supported by the IEEE 802.11 standard?
(Essay)
4.8/5
(26)
When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.
(Multiple Choice)
4.9/5
(36)
A ____ is a database stored on the network that contains information about users and network devices.
(Multiple Choice)
4.8/5
(40)
Briefly describe the functions of a RADIUS client and a RADIUS server.
(Essay)
4.7/5
(34)
The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.
(Multiple Choice)
4.8/5
(32)
Several of the EAP protocols use ____, which creates a ciphertext from cleartext.
(Multiple Choice)
4.8/5
(39)
LDAP was developed by Microsoft and the University of Michigan in 1996.
(True/False)
4.8/5
(33)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)