Exam 9: Wireless LAN Security Vulnerabilities
Exam 1: The World of Wireless41 Questions
Exam 2: Wireless Local Area Networks41 Questions
Exam 3: Radio Frequency Fundamentals42 Questions
Exam 4: Antennas41 Questions
Exam 5: Physical Layer Standards42 Questions
Exam 6: Medium Access Control Layer Standards42 Questions
Exam 7: WLAN Management and Architectures41 Questions
Exam 8: Conducting a Site Survey41 Questions
Exam 9: Wireless LAN Security Vulnerabilities40 Questions
Exam 10: Implementing Wireless LAN Security40 Questions
Exam 11: Managing a Wireless LAN41 Questions
Exam 12: Wireless Network Troubleshooting and Optimization41 Questions
Exam 13: Other Wireless Networks42 Questions
Select questions type
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B, C, D
On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
D
Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.
Free
(Short Answer)
4.9/5
(34)
Correct Answer:
algorithm
A ____ attack on WEP involves identifying two packets derived from the same IV.
(Multiple Choice)
4.7/5
(31)
Which of the following is NOT an information security layer?
(Multiple Choice)
4.7/5
(33)
Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)
(Multiple Choice)
4.9/5
(35)
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?
(Multiple Choice)
4.8/5
(26)
A user needs to enter the service set identifier manually when which weak security measure is employed?
(Multiple Choice)
4.8/5
(40)
The three protections that must be extended over information can be described by the acronym ________.
(Short Answer)
4.9/5
(42)
Which of the following are difficulties faced in defending attacks? (Choose all that apply.)
(Multiple Choice)
4.9/5
(44)
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
(Multiple Choice)
4.7/5
(32)
Attacks that use many computers to attack a single network are called centralized attacks.
(True/False)
4.9/5
(36)
Wireless access control is intended to limit a user's admission to the _______.
(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)