Exam 24: Wireless Network Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
At the top level of the group key hierarchy is the ___________.
(Short Answer)
4.8/5
(31)
Two types of countermeasures are appropriate to deal with eavesdropping: signal-hiding techniques and ____________.
(Short Answer)
4.9/5
(37)
WPA2 incorporates all of the features of the IEEE 802.11i WLANsecurity specifications.
(True/False)
5.0/5
(43)
The concerns for wireless security, in terms of threats, andcountermeasures, are different to those found in a wired environment, such as an Ethernet LAN or a wired wide-area network.
(True/False)
4.8/5
(37)
A(n) __________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.
(Multiple Choice)
4.7/5
(41)
A ____________ attack involves persuading a user and an access point to believe that they are talking to each other when in fact the communication is going through an intermediate attacking device.
(Short Answer)
4.8/5
(38)
Like TKIP, CCMP provides two services: message integrity and ________.
(Short Answer)
4.8/5
(35)
The specification of a protocol, along with the chosen key length, is known as a ___.
(Multiple Choice)
4.8/5
(38)
The purpose of the discovery phase is for an STA and an AP torecognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.
(True/False)
4.8/5
(35)
The field following the MSDU field is referred to as the ___________.
(Short Answer)
4.8/5
(30)
A __________ attack targets wireless access points that are exposed to non-filtered network traffic, such as routing protocol messages or network management messages.
(Short Answer)
4.7/5
(37)
The primary purpose of the MAC layer is to transfer MSDUsbetween MAC entities.
(True/False)
4.8/5
(36)
The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.
(Multiple Choice)
5.0/5
(38)
The security requirements are: confidentiality, integrity, availability, authenticity, and __________.
(Short Answer)
5.0/5
(35)
The fields preceding the MSDU field are referred to as the _________.
(Short Answer)
4.8/5
(34)
In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________, a set of security mechanisms that eliminates most 802.11 security issues, as a Wi-Fi standard.
(Multiple Choice)
4.9/5
(32)
An extended service set (ESS) is a set of stations controlled by asingle coordination function.
(True/False)
4.9/5
(36)
The MPDU exchange for distributing pairwise keys is known as the _______.
(Multiple Choice)
4.8/5
(26)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)