Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

An EAP response message may contain ________.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

In normal ARP traffic, every host can make ARP requests.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

EAP uses RADIUS for authentication.

(True/False)
4.8/5
(34)

In a MITM attack, access to the local network is not required in order to work.

(True/False)
4.8/5
(38)

________ is used by ________ for authentication.

(Multiple Choice)
4.8/5
(36)

The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification.

(True/False)
4.9/5
(33)

What mistake did the 802.11i Working Group make when creating IVs?

(Multiple Choice)
4.8/5
(43)

________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying.

(Multiple Choice)
4.8/5
(40)

A ________ attack is when a webserver is flooded with application layer web requests.

(Multiple Choice)
5.0/5
(36)

In 802.11i, EAP outer authentication takes place before inner authentication.

(True/False)
4.9/5
(31)

Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs.

(Multiple Choice)
4.9/5
(39)

Firms still choose to use WPA in order to ________.

(Multiple Choice)
4.9/5
(40)

The Wi-Fi Alliance calls 802.11i ________.

(Multiple Choice)
4.8/5
(32)

Rogue access points are unauthorized access points set up by individuals or departments.

(True/False)
4.7/5
(34)

The ultimate goal of a DoS attack is to ________.

(Multiple Choice)
4.9/5
(37)

Ensuring network ________ means that authorized users have access to information, services, and network resources.

(Multiple Choice)
4.8/5
(31)

An attacker controlling bots in a coordinated attack against a victim is known as a ________.

(Multiple Choice)
4.8/5
(40)

The 802.11 standards were developed by the IEEE 802.11 Working Group.

(True/False)
4.8/5
(31)

A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)