Deck 7: Wireless Network Security

Full screen (f)
exit full mode
Question
The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.
Use Space or
up arrow
down arrow
to flip the card.
Question
The actual method of key generation depends on the details of the authentication protocol used.
Question
MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.
Question
Sensors and robots, are not vulnerable to physical attacks.
Question
Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
Question
The DS can be a switch, a wired network, or a wireless network.
Question
IEEE 802.11 is a standard for wireless LANs.
Question
The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium

A)transmission layer
B)logical layer
C)media access control layer D.physical layer
Question
The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
Question
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point

A)malicious association
B)identiy theft
C)network injection
D)ad hoc network
Question
___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing

A)DoS
B)Accidental association
C)Nontraditional networks
D)Ad hoc networks
Question
The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.
Question
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
Question
You should allow only specific computers to access your wireless network.
Question
Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.
Question
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________

A)physical layer
B)control layer
C)logical link layer
D)media access layer
Question
The pairwise master key is derived from the group key.
Question
The term used for certified 802.11b products is ___________

A)WAP
B)Wi-Fi
C)WEP
D)WPA
Question
IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.
Question
Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.
Question
The specification of a protocol along with the chosen key length is known as a __________

A)extended service
B)distribution system
C)cipher suite
D)RSN
Question
The __________ layer is responsible for detecting errors and discarding any frames that contain errors.
Question
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Question
____________ can occur when a company's wireless LAN or wireless access points to wired LANs in close proximity and may create overlapping transmission ranges.A user intending to connect to one LAN may unintentionally lock on to a wireless access point from a neighboring network

A)Network injection
B)Denial of service attacks
C)Man-in-the-middle attacks
D)Accidental association
Question
__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.
Question
A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer

A)station
B)MPU
C)service data unit
D)MSDU
Question
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities

A)WPA
B)RSN
C)TKIP
D)WAE
Question
The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated

A)AAA Key
B)GTK
C)PTK
D)PSK
Question
The __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames

A)transmission
B)media access control
C)logical link control
D)physical layer
Question
An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.
Question
In simple terms, the wireless environment consists of three components that provide point of attack: the endpoint, the ______________, and the access point.
Question
The master session key is also known as the __________ key

A)AAA
B)GTK
C)MIC
D)STA
Question
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.
Question
Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
Question
To certify interoperability for 802.11b products an industry consortium named the __________ was formed.
Question
The first 802.11 standard to gain broad industry acceptance was _________

A)802.11i
B)802.11a
C)802.11g
D)802.11b
Question
In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.
Question
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake

A)MIC key
B)EAPOL-KEK
C)EAPOL-KCK
D)TK
Question
The smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.
Question
The __________ is the information that is delivered as a unit between MAC users

A)MSDU
B)DS
C)MPDU
D)BSS
Question
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.
Question
The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PTK for data sessions.
Question
The IEEE 802.11 protocol stack consists of the logical link control layer, the medium access control layer, and the _________ layer.
Question
The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.
Question
The MPDU authentication phase consists of three phases.They are: connect to AS, EAP exchange and _________ .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Wireless Network Security
1
The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.
False
2
The actual method of key generation depends on the details of the authentication protocol used.
True
3
MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.
True
4
Sensors and robots, are not vulnerable to physical attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The DS can be a switch, a wired network, or a wireless network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
IEEE 802.11 is a standard for wireless LANs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium

A)transmission layer
B)logical layer
C)media access control layer D.physical layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point

A)malicious association
B)identiy theft
C)network injection
D)ad hoc network
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing

A)DoS
B)Accidental association
C)Nontraditional networks
D)Ad hoc networks
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
You should allow only specific computers to access your wireless network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________

A)physical layer
B)control layer
C)logical link layer
D)media access layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The pairwise master key is derived from the group key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
The term used for certified 802.11b products is ___________

A)WAP
B)Wi-Fi
C)WEP
D)WPA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The specification of a protocol along with the chosen key length is known as a __________

A)extended service
B)distribution system
C)cipher suite
D)RSN
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The __________ layer is responsible for detecting errors and discarding any frames that contain errors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
____________ can occur when a company's wireless LAN or wireless access points to wired LANs in close proximity and may create overlapping transmission ranges.A user intending to connect to one LAN may unintentionally lock on to a wireless access point from a neighboring network

A)Network injection
B)Denial of service attacks
C)Man-in-the-middle attacks
D)Accidental association
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer

A)station
B)MPU
C)service data unit
D)MSDU
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities

A)WPA
B)RSN
C)TKIP
D)WAE
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated

A)AAA Key
B)GTK
C)PTK
D)PSK
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames

A)transmission
B)media access control
C)logical link control
D)physical layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
In simple terms, the wireless environment consists of three components that provide point of attack: the endpoint, the ______________, and the access point.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The master session key is also known as the __________ key

A)AAA
B)GTK
C)MIC
D)STA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
To certify interoperability for 802.11b products an industry consortium named the __________ was formed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The first 802.11 standard to gain broad industry acceptance was _________

A)802.11i
B)802.11a
C)802.11g
D)802.11b
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake

A)MIC key
B)EAPOL-KEK
C)EAPOL-KCK
D)TK
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The __________ is the information that is delivered as a unit between MAC users

A)MSDU
B)DS
C)MPDU
D)BSS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PTK for data sessions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The IEEE 802.11 protocol stack consists of the logical link control layer, the medium access control layer, and the _________ layer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The MPDU authentication phase consists of three phases.They are: connect to AS, EAP exchange and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.