Exam 24: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ attack targets wireless access points that are exposed to non-filtered network traffic,such as routing protocol messages or network management messages.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

network injection

The final form of the 802.11i standard is referred to as ________.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

The principal threats to wireless transmission are disruption,_____________,and altering or inserting messages.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

eavesdropping

The association service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

(True/False)
4.8/5
(33)

The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n)____________.

(Multiple Choice)
4.9/5
(36)

The most significant source of risk in wireless networks in the underlying communications medium.

(True/False)
4.7/5
(39)

A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

(Multiple Choice)
4.7/5
(27)

The transmission medium carries the radio waves for data transfer.

(True/False)
4.8/5
(37)

An extended service set (ESS)is a set of stations controlled by a single coordination function.

(True/False)
4.8/5
(44)

Any device that contains an IEEE 802.11 conformant MAC and physical layer is a basic service set.

(True/False)
4.9/5
(30)

An example of a __________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.

(Multiple Choice)
4.7/5
(29)

In most data-link control protocols,the data-link protocol entity is responsible not only for detecting errors using the CRC,but for recovering from those errors by retransmitting damaged frames.

(True/False)
4.9/5
(25)

Company wireless LANs or wireless access points to wired LANs in close proximity may create overlapping transmission ranges.

(True/False)
4.9/5
(34)

The fields preceding the MSDU field are referred to as the _________.

(Short Answer)
4.7/5
(40)

The two services involved with the distribution of messages within a DS are distribution and _________.

(Short Answer)
4.7/5
(41)

The purpose of the authentication phase is to maintain backward compatibility with the IEEE 802.11 state machine.

(True/False)
4.8/5
(36)

______ is the recommended technique for wireless network security.

(Multiple Choice)
4.7/5
(17)

A wireless client can be _______.

(Multiple Choice)
4.7/5
(34)

The concerns for wireless security,in terms of threats,and countermeasures,are different to those found in a wired environment, such as an Ethernet LAN or a wired wide-area network.

(True/False)
4.8/5
(41)

In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________,a set of security mechanisms that eliminates most 802.11 security issues,as a Wi-Fi standard.

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)