Exam 24: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The wireless access point provides a connection to the network or service.

(True/False)
4.7/5
(39)

The MPDU exchange for distributing pairwise keys is known as the _______.

(Multiple Choice)
4.7/5
(31)

A ____________ attack involves persuading a user and an access point to believe that they are talking to each other when in fact the communication is going through an intermediate attacking device.

(Short Answer)
4.9/5
(40)

A(n)__________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.

(Multiple Choice)
4.7/5
(36)

The smallest building block of a wireless LAN is a ______.

(Multiple Choice)
4.9/5
(38)

The primary purpose of the MAC layer is to transfer MSDUs between MAC entities.

(True/False)
4.8/5
(37)

The specification of a protocol,along with the chosen key length,is known as a ___.

(Multiple Choice)
4.8/5
(40)

A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

(Short Answer)
4.9/5
(44)

The lowest layer of the IEEE 802 reference model is the __________ layer.

(Short Answer)
4.8/5
(29)

At the top level of the group key hierarchy is the ___________.

(Short Answer)
4.8/5
(41)

The MAC service data unit contains any protocol control information needed for the functioning of the MAC protocol.

(True/False)
4.9/5
(43)

CRC is an error detecting code.

(True/False)
4.8/5
(40)

The field following the MSDU field is referred to as the ___________.

(Short Answer)
4.9/5
(40)

There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.

(Short Answer)
4.8/5
(32)

The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

(Multiple Choice)
4.9/5
(30)

The security requirements are: confidentiality,integrity,availability,authenticity,and __________.

(Short Answer)
4.7/5
(38)

Like TKIP,CCMP provides two services: message integrity and ________.

(Short Answer)
4.8/5
(33)

The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.

(Multiple Choice)
4.8/5
(44)

WPA2 incorporates all of the features of the IEEE 802.11i WLAN security specifications.

(True/False)
4.9/5
(41)

The wireless environment consists of three components that provide point of attack: the wireless client,the transmission medium,and the _________.

(Short Answer)
4.7/5
(46)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)