Deck 12: Wireless
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/43
Play
Full screen (f)
Deck 12: Wireless
1
What is wireless networking?
A)The transmission of packetized data by means of fiber optic cable
B)The transmission of packetized data via the internet
C)The transmission of packetized data by means of physical topology not using direct physical links
D)The transmission of packetized data by means of private bands
A)The transmission of packetized data by means of fiber optic cable
B)The transmission of packetized data via the internet
C)The transmission of packetized data by means of physical topology not using direct physical links
D)The transmission of packetized data by means of private bands
C
2
______________ is the process by which each end of the data flow proves that they are who they say they are.
A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
C
3
With any wireless protocol,which of the following are true?
A)Extra care should be taken to ensure that the security of the protocol is not compromised.
B)A WAP gateway should be created.
C)Encryption standards should be random.
D)RSA encryption should be used.
A)Extra care should be taken to ensure that the security of the protocol is not compromised.
B)A WAP gateway should be created.
C)Encryption standards should be random.
D)RSA encryption should be used.
A
4
When an attacker uses Bluetooth to copy e-mails,contact lists,or other files on the device,it is called
A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
5
______________ means reliable information.
A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
6
A new standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is
A)WAP
B)WTLS
C)802.11b
D)804.11b
A)WAP
B)WTLS
C)802.11b
D)804.11b
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
7
Security issues associated with WTLS include which of the following?
A)The specifications do not allow connections without high security.
B)WTLS cannot cope with small amounts of memory.
C)WTLS cannot cope with limited processor capacity.
D)Clients with low memory or CPU capabilities cannot support encryption.
A)The specifications do not allow connections without high security.
B)WTLS cannot cope with small amounts of memory.
C)WTLS cannot cope with limited processor capacity.
D)Clients with low memory or CPU capabilities cannot support encryption.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
8
The cryptographic standard for proposed for 3G networks is
A)EVDO
B)MISTY1
C)HSPA
D)KASUMI
A)EVDO
B)MISTY1
C)HSPA
D)KASUMI
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
9
______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set.
A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following protocols was designed for short-range wireless communication typically with mobile phones?
A)WPA2
B)Bluetooth
C)WEP
D)802.11n
A)WPA2
B)Bluetooth
C)WEP
D)802.11n
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
11
_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet.
A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following specifications of 802.11 has the highest speed?
A)g
B)n
C)i
D)s
A)g
B)n
C)i
D)s
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
13
What is WAP?
A)It is a protocol used by laptop computers for wireless communication.
B)It is used primarily to encrypt wired communications,but can be used for wireless as well.
C)It is another name for 802.11g.
D)It is a protocol used by cellular phones to deliver e-mail and lightweight web services.
A)It is a protocol used by laptop computers for wireless communication.
B)It is used primarily to encrypt wired communications,but can be used for wireless as well.
C)It is another name for 802.11g.
D)It is a protocol used by cellular phones to deliver e-mail and lightweight web services.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
14
WAP was designed to work on which of the following?
A)Devices with low computing power
B)Devices with high computing power
C)Devices with long range
D)Devices with short range
A)Devices with low computing power
B)Devices with high computing power
C)Devices with long range
D)Devices with short range
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
15
_________ is sending an unauthorized message to another Bluetooth device.
A)Bluejacking
B)Bluesnarfing
C)Bluehacking
D)Bluephreaking
A)Bluejacking
B)Bluesnarfing
C)Bluehacking
D)Bluephreaking
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
16
WAP uses _______________ for its encryption scheme.
A)WEP
B)SSL
C)WTLS
D)ElGamal
A)WEP
B)SSL
C)WTLS
D)ElGamal
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
17
Why is wireless problematic from a security standpoint?
A)There is no control over physical limitations.
B)Insufficient signal strength
C)There is no control over the physical layer of traffic.
D)There is no control over the network.
A)There is no control over physical limitations.
B)Insufficient signal strength
C)There is no control over the physical layer of traffic.
D)There is no control over the network.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
18
The security concern over the so-called WAP gap is when
A)WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway.
B)WAP gateways have a significant lag and hold the messages long enough for them to be decrypted by attackers.
C)WAP protocol is susceptible to Gateway Acquisition Pilfering (gap).
D)The encryption fails to translate from one encryption scheme to another.
A)WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway.
B)WAP gateways have a significant lag and hold the messages long enough for them to be decrypted by attackers.
C)WAP protocol is susceptible to Gateway Acquisition Pilfering (gap).
D)The encryption fails to translate from one encryption scheme to another.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
19
WAP implements integrity through the use of
A)DES
B)3DES
C)MACs
D)DACs
A)DES
B)3DES
C)MACs
D)DACs
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
20
802.11 is the IEEE standard for wireless local area networks and includes the following:
A)a,b,c,g
B)n,g,c
C)a,b,g,n
D)b,g,n
A)a,b,c,g
B)n,g,c
C)a,b,g,n
D)b,g,n
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
21
A(n)_______________ is a 802.11 management frame for the network and contains several different fields such as the time stamp and beacon interval.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
22
In _______________,the attacker uses a Bluetooth to establish a serial connection to the device.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
23
Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails,contact lists,calendars,photos,and videos.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
24
The most common frequency band used in the household is 4.2 GHz.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
25
In _______________,instead of sending an unsolicited message to the victim's phone,the attacker copies off the victim's information,which can include e-mails or contact lists.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
26
_______________ started with people using chalk on sidewalks to mark some of the wireless networks they found.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
27
_______________ is a modulation type that spreads the traffic sent over the entire bandwidth.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
28
_______________ encrypts the plaintext data and then sends it over the airwaves as a cipher text.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
29
WEP was not designed with confidentiality in mind.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
30
_______________ multiplexes or separates the data to be transmitted into smaller chunks and then transmits the chunks on several sub channels.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
31
Because the security of wireless LANs is ineffective,many users have switched to a layered security approach.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
32
802.1x is not is not compatible with RADIUS or LDAP.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
33
Access to actual Ethernet segments is not protected by physical security measures.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
34
WEP provides strong protection for confidentiality.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
35
NetStumbler is a program that is used to sniff wireless traffic and break WEP keys.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
36
_______________ protocol can support a wide variety of authentication methods and also fits well into existing authentication systems like RADIUS.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
37
Alert messages in Wireless Transport Layer Security (WTLS)are sometimes sent in plaintext and are not authenticated.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
38
If unauthorized wireless is set up,it is known as a(n)_______________.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
39
_______________ is a term used for the act of sending an unauthorized message to another Bluetooth device.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
40
Physical access to a machine will enable an attacker to bypass any security measure that has been placed on that machine.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
41
What is WAP and what are its security implications?
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
42
Discuss 802.11 security issues and possible solutions.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
43
Describe the different wireless systems in use today.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck