Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a P2P attack, there is a change in the overall volume of traffic but the traffic pattern is the same.

(True/False)
4.8/5
(30)

The original 802.11 core security protocol, ________, was deeply flawed.

(Multiple Choice)
4.9/5
(36)

Using a shared initial key is dangerous in ________.

(Multiple Choice)
4.9/5
(34)

In normal ARP traffic, generally an attacker on the same network cannot see traffic between two hosts.

(True/False)
4.8/5
(41)

Most central authentication servers are governed by the ________ standard.

(Multiple Choice)
4.8/5
(35)

Focusing electronic attacks on specific high-value targets is known as whaling.

(True/False)
4.8/5
(40)

Rerouting traffic using ARP poisoning is an attack on ________ of a network.

(Multiple Choice)
4.8/5
(43)

Secure wireless networks can be legally accessed by anyone and are frequently posted as such.

(True/False)
4.8/5
(32)

What was the first core wireless security standard?

(Multiple Choice)
4.8/5
(38)

RC4 uses WEP for fast and therefore cheap encryption.

(True/False)
4.9/5
(33)

Wireless IDSs get their data from the company's access points.

(True/False)
4.8/5
(24)

ARP is used to resolve 48-bit IP addresses into 32-bit local MAC addresses.

(True/False)
4.8/5
(40)

The most common attack against a wireless network is a wireless DoS attack.

(True/False)
4.9/5
(36)

Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network.

(Multiple Choice)
4.7/5
(33)

In regards to network security, ________ is the policy-driven control of access to systems, data, and dialogues.

(Multiple Choice)
4.9/5
(32)

WEP mandates private keys.

(True/False)
4.8/5
(42)

SYN-ACK can be best described as the second part of a three-way TCP handshake sent in response to a SYN.

(True/False)
4.9/5
(38)

DoS network attacks are fairly uncommon.

(True/False)
4.9/5
(40)

RTS frames tell other wireless clients that you want to transmit for a given amount of time.

(True/False)
4.8/5
(32)

A DoS attack makes a server or network unavailable by flooding it with attack packets.

(True/False)
4.7/5
(38)
Showing 61 - 80 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)