Exam 12: Wireless

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is WAP and what are its security implications?

Free
(Essay)
4.9/5
(32)
Correct Answer:
Verified

WAP is the data protocol used by many cellular phones to deliver e-mail and lightweight web services.Designers created WTLS as a method to ensure privacy of data being broadcast over WAP.WTLS has a number of inherent security problems,such as weak encryption necessitated by the low computing power of the devices,and the network transition that must occur at the cellular provider's network,or the WAP gap.

WAP implements integrity through the use of

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

C

NetStumbler is a program that is used to sniff wireless traffic and break WEP keys.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

_______________ encrypts the plaintext data and then sends it over the airwaves as a cipher text.

(Short Answer)
4.9/5
(39)

When an attacker uses Bluetooth to copy e-mails,contact lists,or other files on the device,it is called

(Multiple Choice)
5.0/5
(34)

_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet.

(Multiple Choice)
4.8/5
(41)

Security issues associated with WTLS include which of the following?

(Multiple Choice)
4.9/5
(44)

The cryptographic standard for proposed for 3G networks is

(Multiple Choice)
4.8/5
(30)

WEP was not designed with confidentiality in mind.

(True/False)
4.8/5
(34)

If unauthorized wireless is set up,it is known as a(n)_______________.

(Short Answer)
4.8/5
(37)

WAP was designed to work on which of the following?

(Multiple Choice)
4.8/5
(35)

A new standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is

(Multiple Choice)
5.0/5
(36)

Access to actual Ethernet segments is not protected by physical security measures.

(True/False)
4.8/5
(32)

A(n)_______________ is a 802.11 management frame for the network and contains several different fields such as the time stamp and beacon interval.

(Short Answer)
4.7/5
(34)

_______________ protocol can support a wide variety of authentication methods and also fits well into existing authentication systems like RADIUS.

(Short Answer)
4.8/5
(36)

_________ is sending an unauthorized message to another Bluetooth device.

(Multiple Choice)
4.8/5
(31)

What is wireless networking?

(Multiple Choice)
4.9/5
(34)

802.1x is not is not compatible with RADIUS or LDAP.

(True/False)
4.8/5
(37)

Physical access to a machine will enable an attacker to bypass any security measure that has been placed on that machine.

(True/False)
4.8/5
(41)

The security concern over the so-called WAP gap is when

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)