Exam 24: Wireless Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

At the top level of the group key hierarchy is the ___________.

(Short Answer)
4.8/5
(31)

Two types of countermeasures are appropriate to deal with eavesdropping: signal-hiding techniques and ____________.

(Short Answer)
4.9/5
(37)

WPA2 incorporates all of the features of the IEEE 802.11i WLANsecurity specifications.

(True/False)
5.0/5
(43)

The concerns for wireless security, in terms of threats, andcountermeasures, are different to those found in a wired environment, such as an Ethernet LAN or a wired wide-area network.

(True/False)
4.8/5
(37)

A(n) __________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.

(Multiple Choice)
4.7/5
(41)

A ____________ attack involves persuading a user and an access point to believe that they are talking to each other when in fact the communication is going through an intermediate attacking device.

(Short Answer)
4.8/5
(38)

A wireless access point is a _______.

(Multiple Choice)
5.0/5
(34)

Like TKIP, CCMP provides two services: message integrity and ________.

(Short Answer)
4.8/5
(35)

The specification of a protocol, along with the chosen key length, is known as a ___.

(Multiple Choice)
4.8/5
(38)

The smallest building block of a wireless LAN is a ______.

(Multiple Choice)
4.9/5
(32)

The purpose of the discovery phase is for an STA and an AP torecognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.

(True/False)
4.8/5
(35)

The field following the MSDU field is referred to as the ___________.

(Short Answer)
4.8/5
(30)

A __________ attack targets wireless access points that are exposed to non-filtered network traffic, such as routing protocol messages or network management messages.

(Short Answer)
4.7/5
(37)

The primary purpose of the MAC layer is to transfer MSDUsbetween MAC entities.

(True/False)
4.8/5
(36)

The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

(Multiple Choice)
5.0/5
(38)

The security requirements are: confidentiality, integrity, availability, authenticity, and __________.

(Short Answer)
5.0/5
(35)

The fields preceding the MSDU field are referred to as the _________.

(Short Answer)
4.8/5
(34)

In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________, a set of security mechanisms that eliminates most 802.11 security issues, as a Wi-Fi standard.

(Multiple Choice)
4.9/5
(32)

An extended service set (ESS) is a set of stations controlled by asingle coordination function.

(True/False)
4.9/5
(36)

The MPDU exchange for distributing pairwise keys is known as the _______.

(Multiple Choice)
4.8/5
(26)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)