Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is a network attack that manipulates host ARP tables to reroute LAN traffic?

(Multiple Choice)
4.9/5
(40)

IDS refers to ________.

(Multiple Choice)
4.7/5
(37)

Which of the following is the second primary DoS method used by attackers?

(Multiple Choice)
4.7/5
(36)

An open network can be legally accessed by anyone.

(True/False)
4.9/5
(40)

To work with an access point, a station must know the access point's ________.

(Multiple Choice)
4.9/5
(41)

Promiscuous mode allows an attacker to receive messages addressed to other users.

(True/False)
4.8/5
(34)

DoS attacks can cause harm by slowly degrading services over time.

(True/False)
4.9/5
(42)

Evil twin access point attacks are less commonly found in public hot spots.

(True/False)
4.7/5
(32)

Wireless LANs are not possible.

(True/False)
4.8/5
(30)

A(n) ________ can be used to gather user data.

(Multiple Choice)
4.7/5
(32)

DoS attacks are one of the least common types of network attacks against corporations.

(True/False)
4.9/5
(37)

Rate limiting can be used to reduce a certain type of traffic to a reasonable amount.

(True/False)
4.8/5
(38)

A(n) ________ is a personal computer that has software to allow the computer to masquerade as an access point.

(Multiple Choice)
4.9/5
(35)

The name of the 802.1X standard is ________.

(Multiple Choice)
4.8/5
(34)

Wireless attacks focus on the ________.

(Multiple Choice)
4.8/5
(24)

The ________ standard provides access control to prevent illegitimate clients from associating with a network.

(Multiple Choice)
4.8/5
(24)

Black-holing an attacker is a poor long-term strategy because attackers can quickly change source IP addresses.

(True/False)
4.9/5
(38)

________ tell wireless clients that you have received an RTS frame and that they should not transmit until the designated time expires.

(Multiple Choice)
4.8/5
(35)

RADIUS provides auditing of connections.

(True/False)
4.9/5
(38)

802.1X is quite challenging to implement in wired LANs.

(True/False)
4.8/5
(29)
Showing 61 - 80 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)