Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.

(Multiple Choice)
4.8/5
(42)

"Death of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is impossible.

(True/False)
4.8/5
(25)

An unauthorized access point set up by individuals or departments is called a(n) ________ access point.

(Multiple Choice)
4.9/5
(30)

In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts.

(True/False)
4.8/5
(25)

Many companies continue to use WEP to avoid the cost of reconfiguring all of their access points and clients to 802.11i and because WEP has not been fully cracked yet.

(True/False)
4.9/5
(37)

Focusing electronic attacks on specific high-value targets is known as promiscuous attacks.

(True/False)
4.9/5
(38)

When a new EAP authentication is added, software has to be changed on the ________.

(Multiple Choice)
4.8/5
(40)

In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim.

(True/False)
4.8/5
(23)

What standard did the 802.11 Working Group create to extend 802.1X operation to WLANs with security for EAP?

(Multiple Choice)
4.9/5
(27)

Attackers can exploit WEPs weaknesses by ________.

(Multiple Choice)
4.8/5
(33)

Listing your friend's home in the local classifieds at a low price is equivalent to a ________.

(Multiple Choice)
4.8/5
(31)

Access control is more of a problem for wired LANs than for wireless LANs.

(True/False)
5.0/5
(35)

________ is/are effective method(s) to preventing ARP poisoning attacks.

(Multiple Choice)
4.8/5
(38)

A direct attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer.

(True/False)
4.9/5
(28)

Pre-shared key mode was created for homes and small businesses with a single access point.

(True/False)
4.8/5
(38)

To use an access point, you must know its SSID.

(True/False)
4.8/5
(34)

Flooding the frequency of a wireless network is one method attackers use to affect the network.

(True/False)
4.8/5
(31)

ARP is used to resolve 32-bit IP addresses into 48-bit local MAC addresses.

(True/False)
5.0/5
(39)

In 802.11i pre-shared key mode, the initial key is generated ________.

(Multiple Choice)
4.9/5
(34)

By giving unauthorized users access to a local WLAN means that they are on the local network.

(True/False)
4.8/5
(29)
Showing 81 - 100 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)