Exam 4: Secure Networks
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
An EAP response message may contain ________.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
In normal ARP traffic, every host can make ARP requests.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
In a MITM attack, access to the local network is not required in order to work.
(True/False)
4.8/5
(38)
The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification.
(True/False)
4.9/5
(33)
What mistake did the 802.11i Working Group make when creating IVs?
(Multiple Choice)
4.8/5
(43)
________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying.
(Multiple Choice)
4.8/5
(40)
A ________ attack is when a webserver is flooded with application layer web requests.
(Multiple Choice)
5.0/5
(36)
In 802.11i, EAP outer authentication takes place before inner authentication.
(True/False)
4.9/5
(31)
Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs.
(Multiple Choice)
4.9/5
(39)
Rogue access points are unauthorized access points set up by individuals or departments.
(True/False)
4.7/5
(34)
Ensuring network ________ means that authorized users have access to information, services, and network resources.
(Multiple Choice)
4.8/5
(31)
An attacker controlling bots in a coordinated attack against a victim is known as a ________.
(Multiple Choice)
4.8/5
(40)
The 802.11 standards were developed by the IEEE 802.11 Working Group.
(True/False)
4.8/5
(31)
A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)