Exam 18: Wireless Network Security
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
Derived from the GMK,the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
Free
(Essay)
5.0/5
(40)
Correct Answer:
Group Temporal Key (GTK)
The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.
Free
(Essay)
4.9/5
(33)
Correct Answer:
1X
The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
Free
(True/False)
5.0/5
(32)
Correct Answer:
True
The IEEE 802.11 protocol stack consists of the logical link control layer,the medium access control layer,and the _________ layer.
(Essay)
4.8/5
(40)
The specification of a protocol along with the chosen key length is known as a __________ .
(Multiple Choice)
4.8/5
(38)
__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.
(Essay)
4.9/5
(36)
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
(True/False)
4.7/5
(31)
You should allow only specific computers to access your wireless network.
(True/False)
4.9/5
(35)
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
(Essay)
4.8/5
(32)
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .
(Multiple Choice)
4.9/5
(34)
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.
(Multiple Choice)
4.7/5
(38)
In an)__________ situation,a wireless device is configured to appear to be a legitimate access point,enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.
(Multiple Choice)
4.8/5
(37)
The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated.
(Multiple Choice)
4.9/5
(36)
Wireless networks,and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.
(True/False)
4.9/5
(35)
The function of the __________ is to on transmission assemble data into a frame,on reception disassemble frame and perform address recognition and error detection,and govern access to the LAN transmission medium.
(Multiple Choice)
4.8/5
(30)
To certify interoperability for 802.11b products an industry consortium named the __________ was formed.
(Essay)
4.8/5
(33)
The first 802.11 standard to gain broad industry acceptance was _________.
(Multiple Choice)
5.0/5
(42)
The __________ layer is responsible for detecting errors and discarding any frames that contain errors.
(Essay)
4.8/5
(42)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)