Exam 24: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The purpose of the discovery phase is for an STA and an AP to recognize each other,agree on a set of security capabilities,and establish an association for future communication using those security capabilities.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

Two types of countermeasures are appropriate to deal with eavesdropping: signal-hiding techniques and ____________.

Free
(Essay)
4.9/5
(30)
Correct Answer:
Verified

encryption

Any device that contains an IEEE 802.11 conformant MAC and physical layer is a basic service set.

Free
(True/False)
4.7/5
(27)
Correct Answer:
Verified

False

The lowest layer of the IEEE 802 reference model is the __________ layer.

(Essay)
4.8/5
(35)

______ is the recommended technique for wireless network security.

(Multiple Choice)
4.8/5
(23)

The two services involved with the distribution of messages within a DS are distribution and _________.

(Essay)
4.8/5
(26)

In most data-link control protocols,the data-link protocol entity is responsible not only for detecting errors using the CRC,but for recovering from those errors by retransmitting damaged frames.

(True/False)
4.8/5
(30)

The security requirements are: confidentiality,integrity,availability,authenticity,and __________.

(Essay)
4.8/5
(35)

Like TKIP,CCMP provides two services: message integrity and ________.

(Essay)
5.0/5
(31)

The wireless access point provides a connection to the network or service.

(True/False)
4.9/5
(37)

The smallest building block of a wireless LAN is a ______.

(Multiple Choice)
4.9/5
(26)

A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

(Essay)
4.8/5
(23)

CRC is an error detecting code.

(True/False)
4.9/5
(33)

The transmission medium carries the radio waves for data transfer.

(True/False)
4.9/5
(28)

A ____________ attack involves persuading a user and an access point to believe that they are talking to each other when in fact the communication is going through an intermediate attacking device.

(Essay)
4.8/5
(31)

A system used to interconnect a set of basic service sets and LANs to create an extended service set is a _________.

(Multiple Choice)
4.8/5
(41)

The specification of a protocol,along with the chosen key length,is known as a ___.

(Multiple Choice)
4.9/5
(35)

The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

(Multiple Choice)
4.9/5
(33)

The most significant source of risk in wireless networks in the underlying communications medium.

(True/False)
4.9/5
(30)

An example of a(n)__________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.

(Multiple Choice)
4.8/5
(25)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)