Exam 10: Implementing Wireless LAN Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Dictionary attacks are used to attack what aspect of WEP2?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

Amongst the most common transport encryption algorithms,used to securely transmit documents over the Internet is which of the following?

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

B

Due to the enhancements in WEP2,it was widely implemented and remains a popular security mechanism today.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

False

WPA ____________________ was designed for individuals or small office home office (SOHO)settings of generally 10 or fewer employees.

(Short Answer)
4.9/5
(32)

Signature-based monitoring can be described as which of the following?

(Multiple Choice)
4.9/5
(38)

It is important that the entire RF spectrum be scanned for potential attacks,which means the channels on which frequencies should be scanned?

(Multiple Choice)
4.9/5
(41)

WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.

(True/False)
4.9/5
(29)

What are the three major components in TKIP that address security vulnerabilities? (Choose three.)

(Multiple Choice)
4.8/5
(30)

Which encryption protocol is used for 802.11i/WPA2?

(Multiple Choice)
4.8/5
(38)

Used in WEP2,____________________ was developed by the Massachusetts Institute of Technology (MIT)and used to verify the identity of network users.

(Short Answer)
4.8/5
(33)

A ____ VPN is a user-to-LAN connection used by remote users.

(Multiple Choice)
4.8/5
(32)

Which was developed to help users who have little or no knowledge of security quickly and easily implement WPA2 on their WLANs?

(Multiple Choice)
4.9/5
(35)

Which of the following are true about wireless security systems? (Choose all that apply.)

(Multiple Choice)
4.7/5
(38)

What authentication system did the proposed WEP2 standard use?

(Multiple Choice)
4.7/5
(40)

Describe a block cipher.

(Essay)
4.7/5
(33)

Briefly describe RADIUS and mention a strength of RADIUS.

(Essay)
4.7/5
(35)

Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply)

(Multiple Choice)
4.8/5
(29)

Describe a dictionary attack.

(Essay)
4.8/5
(33)
Match each term with the correct statement below.
a device in an IEEE 802.1X network that accepts or rejects a supplicant
supplicant
an encryption cipher that takes one character and replaces it with another character
real-time location services
providing access based on a user's job function within an organization
secure shell
Correct Answer:
Verified
Premises:
Responses:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
supplicant
an encryption cipher that takes one character and replaces it with another character
real-time location services
providing access based on a user's job function within an organization
secure shell
dynamically generating a new key for each packet to preventing collisions
802.1X
a method for auditing usage by using an algorithm to determine if a threat exists
Role-Based Access Control
device in an IEEE 802.1X network that makes an appeal for access
per-packet key
using wireless technologies for asset tracking of wireless equipment
stream cipher
an encrypted alternative to the Telnet protocol that is used to access remote computers
wireless intrusion detection system
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
heuristic monitoring
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
authenticator
(Matching)
4.8/5
(36)

What does WPA include that is designed to prevent an attacker from conducting man-in-the-middle attacks?

(Multiple Choice)
5.0/5
(37)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)