Exam 18: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Derived from the GMK,the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.

Free
(Essay)
5.0/5
(40)
Correct Answer:
Verified

Group Temporal Key (GTK)

The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

1X

The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

Free
(True/False)
5.0/5
(32)
Correct Answer:
Verified

True

The IEEE 802.11 protocol stack consists of the logical link control layer,the medium access control layer,and the _________ layer.

(Essay)
4.8/5
(40)

The specification of a protocol along with the chosen key length is known as a __________ .

(Multiple Choice)
4.8/5
(38)

Sensors and robots,are not vulnerable to physical attacks.

(True/False)
4.9/5
(38)

__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.

(Essay)
4.9/5
(36)

The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.

(True/False)
4.7/5
(31)

The master session key is also known as the __________ key.

(Multiple Choice)
4.9/5
(25)

You should allow only specific computers to access your wireless network.

(True/False)
4.9/5
(35)

A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

(Essay)
4.8/5
(32)

The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .

(Multiple Choice)
4.9/5
(34)

The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.

(Multiple Choice)
4.7/5
(38)

In an)__________ situation,a wireless device is configured to appear to be a legitimate access point,enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.

(Multiple Choice)
4.8/5
(37)

The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated.

(Multiple Choice)
4.9/5
(36)

Wireless networks,and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.

(True/False)
4.9/5
(35)

The function of the __________ is to on transmission assemble data into a frame,on reception disassemble frame and perform address recognition and error detection,and govern access to the LAN transmission medium.

(Multiple Choice)
4.8/5
(30)

To certify interoperability for 802.11b products an industry consortium named the __________ was formed.

(Essay)
4.8/5
(33)

The first 802.11 standard to gain broad industry acceptance was _________.

(Multiple Choice)
5.0/5
(42)

The __________ layer is responsible for detecting errors and discarding any frames that contain errors.

(Essay)
4.8/5
(42)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)