Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is the process of obscuring an attackers source IP address.

(Multiple Choice)
4.8/5
(31)

802.11i works in ________ mode.

(Multiple Choice)
4.7/5
(31)

802.11i offers strong security.

(True/False)
4.7/5
(32)

In 802.11i, ________ authentication always uses SSL/TLS.

(Multiple Choice)
4.8/5
(33)

One problem with ARP requests and replies is that they do not require authentication of verification.

(True/False)
4.9/5
(37)

WLAN DoS attacks are designed to affect the ________ of the network.

(Multiple Choice)
4.9/5
(35)

In a man-in-the-middle attack, ________.

(Multiple Choice)
4.9/5
(31)

Most DoS attacks are difficult to detect.

(True/False)
4.8/5
(41)

Once established, botnets can be leased to other criminals for DoS attacks.

(True/False)
4.8/5
(39)

In a large organization, WEP rekeying is inexpensive.

(True/False)
4.9/5
(28)

In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is the same.

(True/False)
4.8/5
(36)

In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim.

(True/False)
4.7/5
(32)

________ is one method of thwarting DoS attacks by dropping all IP packets from an attacker.

(Multiple Choice)
5.0/5
(33)

A firewall does note set aside resources for a connection when a SYN segment arrives, so handling a large number of false SYN segments is only a small burden.

(True/False)
4.9/5
(33)

WEP stands for ________.

(Multiple Choice)
4.9/5
(43)

When a new EAP authentication is added, software does not have to be changed on the ________.

(Multiple Choice)
4.9/5
(34)

WEP typically takes ________ to crack today.

(Multiple Choice)
4.8/5
(33)

________ security uses the RC4 cipher in encryption for confidentiality and the Temporal Key Integrity Protocol for keying and rekeying.

(Multiple Choice)
5.0/5
(36)

WEP encrypts each frame with a per-frame key that consists of the shared RC4 key plus a 24-bit initialization vector that is different for each frame.

(True/False)
4.8/5
(40)

PEAP is a popular extended EAP protocol.

(True/False)
4.9/5
(48)
Showing 41 - 60 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)