Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is an example of a wireless attack?

(Multiple Choice)
4.9/5
(31)

In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host.

(True/False)
4.9/5
(31)

DoS attacks can cause harm by ________.

(Multiple Choice)
4.8/5
(27)

Open networks can be legally accessed by anyone and are frequently posted as such.

(True/False)
4.7/5
(32)

A ________ can be used to gather network information or user data.

(Multiple Choice)
4.8/5
(33)

Evil twin access point attacks are most common in ________.

(Multiple Choice)
4.9/5
(46)

Nearly all wireless access points can support 802.11i.

(True/False)
4.7/5
(30)

________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.

(Multiple Choice)
4.8/5
(40)

CTS frames tell other wireless clients that you want to transmit for a given amount of time.

(True/False)
4.8/5
(37)

Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address.

(True/False)
4.9/5
(36)

The most common attack against a wireless network is a ________.

(Multiple Choice)
4.9/5
(30)

________ are compromised hosts running malware controlled by the hacker.

(Multiple Choice)
4.8/5
(40)

Wireless attacks avoid the access points to limit detection.

(True/False)
4.8/5
(44)

The authenticator is the ________.

(Multiple Choice)
4.8/5
(40)

In regards to network security, ________ means preventing unauthorized users from gaining information about the network structure, data flowing across the network, network protocols used, or packet header values.

(Multiple Choice)
4.8/5
(26)

WEP uses RC4 for fast and therefore cheap encryption.

(True/False)
4.8/5
(38)

A network administrator notices extensive damage to wireless packets. This might indicate a ________ attack.

(Multiple Choice)
4.8/5
(35)

Which of the following measures offers strong security?

(Multiple Choice)
4.9/5
(37)

In 802.1X, the heavy authentication work is done on ________.

(Multiple Choice)
4.8/5
(33)

In pre-shared key mode, a passphrase should be at least ________ characters long?

(Multiple Choice)
5.0/5
(33)
Showing 21 - 40 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)