Exam 24: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The MAC service data unit contains any protocol control information needed for the functioning of the MAC protocol.

(True/False)
4.7/5
(33)

The fields preceding the MSDU field are referred to as the _________.

(Essay)
4.7/5
(47)

The concerns for wireless security,in terms of threats,and countermeasures,are different to those found in a wired environment,such as an Ethernet LAN or a wired wide-area network.

(True/False)
4.9/5
(40)

In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________,a set of security mechanisms that eliminates most 802.11 security issues,as a Wi-Fi standard.

(Multiple Choice)
4.7/5
(31)

A __________ attack targets wireless access points that are exposed to non-filtered network traffic,such as routing protocol messages or network management messages.

(Essay)
4.7/5
(37)

The field following the MSDU field is referred to as the ___________.

(Essay)
4.8/5
(43)

There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.

(Essay)
4.9/5
(38)

The primary purpose of the MAC layer is to transfer MSDUs between MAC entities.

(True/False)
4.8/5
(48)

The association service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

(True/False)
4.9/5
(33)

The final form of the 802.11i standard is referred to as ________.

(Multiple Choice)
4.9/5
(33)

The MPDU exchange for distributing pairwise keys is known as the _______.

(Multiple Choice)
4.7/5
(28)

The principal threats to wireless transmission are disruption,_____________,and altering or inserting messages.

(Essay)
4.8/5
(38)

A wireless access point is a _______.

(Multiple Choice)
4.7/5
(38)

The purpose of the authentication phase is to maintain backward compatibility with the IEEE 802.11 state machine.

(True/False)
4.8/5
(33)

Company wireless LANs or wireless access points to wired LANs in close proximity may create overlapping transmission ranges.

(True/False)
4.8/5
(39)

The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.

(Multiple Choice)
4.8/5
(39)

At the top level of the group key hierarchy is the ___________.

(Essay)
4.8/5
(44)

The 802.11i RSN security specification defines the following services: authentication,privacy with message integrity,and ________.

(Essay)
4.9/5
(39)

WPA2 incorporates all of the features of the IEEE 802.11i WLAN security specifications.

(True/False)
4.8/5
(32)

The wireless environment consists of three components that provide point of attack: the wireless client,the transmission medium,and the _________.

(Essay)
4.8/5
(34)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)