Deck 7: Understanding Wireless Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 7: Understanding Wireless Security
1
Which layer does wireless communication rely heavily upon?
A) MAC sublayer of the Network layer
B) MAC sublayer of the Data Link layer
C) LLC sublayer of the Data Link layer
D) LLC sublayer of the Transport layer
A) MAC sublayer of the Network layer
B) MAC sublayer of the Data Link layer
C) LLC sublayer of the Data Link layer
D) LLC sublayer of the Transport layer
B
2
A RTS frame is the first step of the two-way handshake before sending a data frame.
True
3
SNMP requires the installation of an SNMP agent on the device you want to monitor.
True
4
Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a field in a control frame?
A) Duration
B) Sequence control
C) Frame control
D) Frame check sequence
A) Duration
B) Sequence control
C) Frame control
D) Frame check sequence
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Wireless networks are essentially the same as wired networks when it comes to the security threats each faces.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?
A) association flood
B) jamming
C) session hijacking
D) MAC address spoofing
A) association flood
B) jamming
C) session hijacking
D) MAC address spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is true about the association process?
A) it is a three-step process
B) a station first listens for beacons
C) a station first send an association request
D) the AP transmits an invitation to associate
A) it is a three-step process
B) a station first listens for beacons
C) a station first send an association request
D) the AP transmits an invitation to associate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In which type of attack do attackers intercept the transmissions of two communicating nodes without the user's knowledge?
A) rogue device
B) wardriver
C) man-in-the-middle
D) brute force
A) rogue device
B) wardriver
C) man-in-the-middle
D) brute force
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What is considered to be one of the biggest weaknesses of WEP?
A) 24-bit initialization vector
B) RC4 encryption
C) 128-bit key
D) Kerberos authentication
A) 24-bit initialization vector
B) RC4 encryption
C) 128-bit key
D) Kerberos authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which type of control frame does a station send to let the AP know is can transmit buffered frames?
A) CTS
B) ACK
C) RTS
D) PS-Poll
A) CTS
B) ACK
C) RTS
D) PS-Poll
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What is a WNIC's equivalent of a NIC's promiscuous mode?
A) active scan mode
B) RF monitor mode
C) passive attack mode
D) auto-capture mode
A) active scan mode
B) RF monitor mode
C) passive attack mode
D) auto-capture mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Wireless networks use the CSMA/CD media access method.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about the SSID?
A) they can be Null
B) they are registered
C) they are not found in beacon frames
D) they are found in control frames
A) they can be Null
B) they are registered
C) they are not found in beacon frames
D) they are found in control frames
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which management frame type is sent by a station wanting to terminate the connection?
A) Deauthentication
B) Disassociation
C) Reassociation request
D) Probe response
A) Deauthentication
B) Disassociation
C) Reassociation request
D) Probe response
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is true about wardriving?
A) attackers use RF monitor mode
B) the hardware is very expensive
C) the software is very expensive
D) their goal is simply to hijack a connection
A) attackers use RF monitor mode
B) the hardware is very expensive
C) the software is very expensive
D) their goal is simply to hijack a connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT part of a wireless MAC frame?
A) 802.11 protocol version
B) source MAC address
C) FCS
D) TTL
A) 802.11 protocol version
B) source MAC address
C) FCS
D) TTL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which type of frame advertises services or information on a wireless network?
A) Probe request
B) Association response
C) Beacon
D) Probe response
A) Probe request
B) Association response
C) Beacon
D) Probe response
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What function does a RADIUS server provide to a wireless network?
A) association
B) encryption
C) decryption
D) authentication
A) association
B) encryption
C) decryption
D) authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is performed by the MAC sublayer?
A) joining the wireless network
B) resolving IP address to MAC address
C) resolving names to IP addresses
D) determining best path
A) joining the wireless network
B) resolving IP address to MAC address
C) resolving names to IP addresses
D) determining best path
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
capturing network traffic during transmission
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
capturing network traffic during transmission
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
MIBs gather data and report it to a(n)____________________ management station.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an in-depth examination of a proposed wireless network site
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an in-depth examination of a proposed wireless network site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
___________ key encryption in WEP uses the RC4 encryption algorithm.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A ____________ response is sent by a station in response to a request frame and indicates capabilities,supported data rates,and other information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
any keys used between a pair of devices in TKIP
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
any keys used between a pair of devices in TKIP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that gives a station clearance to begin transmitting packets
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that gives a station clearance to begin transmitting packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is true about MAC addresses in a wireless network?
A) MAC address filtering will stop a determined attacker
B) MAC addresses are Network layer identities
C) you need to configure the MAC address before you use the WNIC
D) you can change a WNICs MAC address with software
A) MAC address filtering will stop a determined attacker
B) MAC addresses are Network layer identities
C) you need to configure the MAC address before you use the WNIC
D) you can change a WNICs MAC address with software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which EAP protocol requires digital certificates to validate supplicants?
A) EAP-TLS
B) EAP-TTLS
C) LEAP
D) FAST
A) EAP-TLS
B) EAP-TTLS
C) LEAP
D) FAST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A _____________ device is a wireless device that employees connect and use without authorization or verified configurations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the process of using a variety of tools and techniques to attempt to break into a network
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the process of using a variety of tools and techniques to attempt to break into a network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the encryption and authentication architecture based on the final ratified IEEE 802.11i standard
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
the encryption and authentication architecture based on the final ratified IEEE 802.11i standard
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an encryption method devised as a replacement for WEP in WPA
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
an encryption method devised as a replacement for WEP in WPA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a two-step process of being accepted into a wireless network
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a two-step process of being accepted into a wireless network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is NOT a suggested practice before using a newly configured wireless network?
A) change the administrator password
B) change the manufacturer's default key
C) use the default encryption method
D) alter the default channel
A) change the administrator password
B) change the manufacturer's default key
C) use the default encryption method
D) alter the default channel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Each access point has a(n)______________ that essentially functions as the name of the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that a station sends when it wants to transmit
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
a type of control frame that a station sends when it wants to transmit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which popular wireless sniffer is an IDS that is passive and undetectable in operation?
A) Kismet
B) NetStumbler
C) AirSnort
D) Aircrack-ng
A) Kismet
B) NetStumbler
C) AirSnort
D) Aircrack-ng
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is true about IEEE 802.11i?
A) it uses WEP2 for authentication and encryption
B) it uses a symmetric block cipher for encryption
C) temporal key integrity protocol is used for encryption
D) it uses PMK to generate data encryption keys
A) it uses WEP2 for authentication and encryption
B) it uses a symmetric block cipher for encryption
C) temporal key integrity protocol is used for encryption
D) it uses PMK to generate data encryption keys
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
attacks that attempt to gather information for subsequent attacks by sending probe request frames on each available channel
a.active attacks
b.association
c.clear to send
d.pairwise keys
e.penetration testing
f.request to send
g.site survey
h.sniffing
i.TKIP
j.WPA2
attacks that attempt to gather information for subsequent attacks by sending probe request frames on each available channel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
List the three types of MAC frames defined by the 802.11 standard.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How is wireless security different than wired security?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe 802.1x authentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List the four most common types of control frames.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is the purpose of MAC address filtering and how can attackers defeat it?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and define the fields in a control frame.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe forged deauthentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List four issues that a wireless security policy should address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What are the two authentication methods provided by early 802.11 standards?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a site survey and why should you conduct one?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck