Exam 4: Secure Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

ICMP can be best described as the second part of a three-way TCP handshake sent in response to a SYN.

(True/False)
5.0/5
(32)

Wireless 802.11 networks generally have a range of ________.

(Multiple Choice)
4.7/5
(34)

WEP mandates shared keys.

(True/False)
4.8/5
(35)

Which of the following measures offers strong security?

(Multiple Choice)
4.9/5
(36)

An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer.

(True/False)
4.7/5
(38)

In ________, users authenticate themselves to the access point via the use of a single, shared initial key.

(Multiple Choice)
4.8/5
(35)

"Breadth of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is possible.

(True/False)
4.9/5
(29)

A ________ is an older attack that uses an illegally large IP packet to crash an operating system.

(Multiple Choice)
4.8/5
(26)

In addition to deauthenticate messages, an attacker could flood wireless clients with ________.

(Multiple Choice)
4.8/5
(30)

________ is called Port-Based Access Control.

(Multiple Choice)
4.9/5
(27)

An EAP failure message is sent to the ________.

(Multiple Choice)
4.9/5
(39)

Rogue access points are authorized access points set up by individuals or departments.

(True/False)
4.8/5
(35)

After gaining wireless access to the private network, the attach can ________.

(Multiple Choice)
4.9/5
(34)

Traditionally, Ethernet LANs offered no access security.

(True/False)
4.8/5
(41)

CTS frames tell other clients that you have received a RTS frame.

(True/False)
4.9/5
(37)

________ are an additional layer of compromised hosts that are used to manage large groups of bots.

(Multiple Choice)
4.9/5
(40)

Some writers prefer to turn off SSID broadcasting.

(True/False)
4.9/5
(31)

An EAP message begins with an ________ message.

(Multiple Choice)
5.0/5
(26)

Which of the following is a benefit of using a central authentication server in 802.1X?

(Multiple Choice)
4.8/5
(33)
Showing 101 - 119 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)