Deck 8: Wireless Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 8: Wireless Network Security
1
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
False
2
____ is designed to detect any changes in a packet, whether accidental or intentional.
A) CBC
B) CRC
C) AES
D) TKIP
A) CBC
B) CRC
C) AES
D) TKIP
B
3
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
A) active
B) passive
C) hybrid
D) neutral
A) active
B) passive
C) hybrid
D) neutral
A
4
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The SSID can generally be any alphanumeric string from 2 to ___ characters.
A) 23
B) 28
C) 32
D) 34
A) 23
B) 28
C) 32
D) 34
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Bluetooth is a ____ technology designed for data communication over short distances.
A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network
A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Bluetooth devices are not backward compatible with previous versions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
APs use antennas that radiate a signal in all directions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is the encryption protocol standard for WPA2.
A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP
A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
A) random
B) sanctioned
C) rogue
D) legitimate
A) random
B) sanctioned
C) rogue
D) legitimate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.
A) PEAP
B) TKIP
C) SSL
D) EAP
A) PEAP
B) TKIP
C) SSL
D) EAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A group of piconets in which connections exist between different piconets is called a ____.
A) broadnet
B) honeynet
C) boundnet
D) scatternet
A) broadnet
B) honeynet
C) boundnet
D) scatternet
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
A) broadcast SSID
B) association request
C) disassociation request
D) connect request
A) broadcast SSID
B) association request
C) disassociation request
D) connect request
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
An ____ is an AP that is set up by an attacker.
A) active twin
B) authorized twin
C) internal replica
D) evil twin
A) active twin
B) authorized twin
C) internal replica
D) evil twin
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.
A) 10
B) 18
C) 15
D) 33
A) 10
B) 18
C) 15
D) 33
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking
A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) ____ acts as the "base station" for the wireless network.
A) AP
B) endpoint
C) WMM
D) ad-hoc peer
A) AP
B) endpoint
C) WMM
D) ad-hoc peer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
If the EAP authentication is successful, a success packet is sent to the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Identify and describe two types of wireless probes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Explain why it is important to be able to control the power level at which the WLAN transmits.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
EAP request packets are issued by the ____.
A) supplicant
B) authenticator
C) authentication server
D) proxy
A) supplicant
B) authenticator
C) authentication server
D) proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.
A) ICMP
B) TKIP
C) EAP
D) RADIUS
A) ICMP
B) TKIP
C) EAP
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ allow a single access point to service different types of users.
A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss how to prevent bluesnarfing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Discuss the different types of interference one might encounter using wireless devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Explain what war driving is.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.
A) TKIP
B) LEAP
C) PEAP
D) ICMP
A) TKIP
B) LEAP
C) PEAP
D) ICMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
A) Legitimate
B) Rogue
C) Sanctioned
D) Twin
A) Legitimate
B) Rogue
C) Sanctioned
D) Twin
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____ requires mutual authentication used for WLAN encryption using Cisco client software.
A) LEAP
B) TKIP
C) EAP
D) PEAP
A) LEAP
B) TKIP
C) EAP
D) PEAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
List and describe the major parts of an access point.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
When a wireless device looks for beacon frames it is known as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the four types of packets used by EAP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe a piconet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe how wireless VLANs can be configured.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck