Exam 9: Wireless LAN Security Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

B, C, D

On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

D

Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.

Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Verified

algorithm

A ____ attack on WEP involves identifying two packets derived from the same IV.

(Multiple Choice)
4.7/5
(31)

Which of the following is NOT an information security layer?

(Multiple Choice)
4.7/5
(33)

Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)

(Multiple Choice)
4.9/5
(35)

Briefly define cryptography.

(Essay)
4.9/5
(36)

WEP guards one of the CIA characteristics,namely what?

(Multiple Choice)
4.9/5
(39)

Which is true about WEP?

(Multiple Choice)
4.7/5
(32)

Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?

(Multiple Choice)
4.8/5
(26)

Describe how an attacker can hijack a wireless connection.

(Essay)
4.9/5
(38)

Describe the five steps in the process of WEP encryption.

(Essay)
4.9/5
(28)

A user needs to enter the service set identifier manually when which weak security measure is employed?

(Multiple Choice)
4.8/5
(40)

The three protections that must be extended over information can be described by the acronym ________.

(Short Answer)
4.9/5
(42)

Which of the following are difficulties faced in defending attacks? (Choose all that apply.)

(Multiple Choice)
4.9/5
(44)

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

(Multiple Choice)
4.7/5
(32)

Attacks that use many computers to attack a single network are called centralized attacks.

(True/False)
4.9/5
(36)

Wireless access control is intended to limit a user's admission to the _______.

(Short Answer)
4.9/5
(34)

How have WLANs changed 'hard edges' into 'blurred edges'?

(Essay)
4.8/5
(36)

Describe open system authentication.

(Essay)
4.8/5
(27)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)