Exam 24: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.

Free
(Short Answer)
5.0/5
(35)
Correct Answer:
Verified

pairwise keys

The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n) ____________.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

The wireless access point provides a connection to the network orservice.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.

(Multiple Choice)
5.0/5
(42)

The transmission medium carries the radio waves for data transfer.

(True/False)
4.9/5
(29)

A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

(Short Answer)
4.8/5
(35)

______ is the recommended technique for wireless network security.

(Multiple Choice)
4.9/5
(27)

A system used to interconnect a set of basic service sets and LANs to create an extended service set is a _________.

(Multiple Choice)
4.8/5
(35)

The most significant source of risk in wireless networks in theunderlying communications medium.

(True/False)
4.7/5
(35)

Any device that contains an IEEE 802.11 conformant MAC andphysical layer is a basic service set.

(True/False)
4.8/5
(33)

The purpose of the authentication phase is to maintain backwardcompatibility with the IEEE 802.11 state machine.

(True/False)
4.7/5
(34)

A wireless client can be _______.

(Multiple Choice)
4.9/5
(41)

The principal threats to wireless transmission are disruption, _____________, and altering or inserting messages.

(Short Answer)
4.8/5
(36)

In most data-link control protocols, the data-link protocol entity isresponsible not only for detecting errors using the CRC, but forrecovering from those errors by retransmitting damaged frames.

(True/False)
4.9/5
(37)

Company wireless LANs or wireless access points to wired LANs inclose proximity may create overlapping transmission ranges.

(True/False)
4.9/5
(32)

The final form of the 802.11i standard is referred to as ________.

(Multiple Choice)
4.8/5
(32)

The two services involved with the distribution of messages within a DS are distribution and _________.

(Short Answer)
4.8/5
(43)

An example of a(n) __________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.

(Multiple Choice)
4.9/5
(42)

The MAC service data unit contains any protocol controlinformation needed for the functioning of the MAC protocol.

(True/False)
4.8/5
(30)

The wireless environment consists of three components that provide point of attack: the wireless client, the transmission medium, and the _________.

(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)