Deck 24: Wireless Network Security

Full screen (f)
exit full mode
Question
The transmission medium carries the radio waves for data transfer.
Use Space or
up arrow
down arrow
to flip the card.
Question
CRC is an error detecting code.
Question
The association service enables transfer of data between a station
on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
Question
A wireless client can be _______.

A)a cell phone
B)a Wi-Fi enabled laptop
C)a Bluetooth device
D)all of the above
Question
The most significant source of risk in wireless networks in the
underlying communications medium.
Question
In most data-link control protocols,the data-link protocol entity is
responsible not only for detecting errors using the CRC,but for
recovering from those errors by retransmitting damaged frames.
Question
A(n)__________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.

A)ESS
B)access point
C)distribution system
D)MPDU
Question
The wireless access point provides a connection to the network or
service.
Question
The MAC service data unit contains any protocol control
information needed for the functioning of the MAC protocol.
Question
Any device that contains an IEEE 802.11 conformant MAC and
physical layer is a basic service set.
Question
The purpose of the discovery phase is for an STA and an AP to
recognize each other,agree on a set of security capabilities,and establish an association for future communication using those security capabilities.
Question
WPA2 incorporates all of the features of the IEEE 802.11i WLAN
security specifications.
Question
Company wireless LANs or wireless access points to wired LANs in
close proximity may create overlapping transmission ranges.
Question
The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

A)DoS
B)man-in-the-middle
C)network injection
D)identity theft
Question
An extended service set (ESS)is a set of stations controlled by a
single coordination function.
Question
The purpose of the authentication phase is to maintain backward
compatibility with the IEEE 802.11 state machine.
Question
The concerns for wireless security,in terms of threats,and
countermeasures,are different to those found in a wired environment, such as an Ethernet LAN or a wired wide-area network.
Question
An example of a __________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.

A)identity theft
B)ad hoc network
C)network injection
D)man-in-the-middle
Question
A wireless access point is a _______.

A)cell tower
B)Wi-Fi hot spot
C)wireless access point to a LAN or WAN
D)all of the above
Question
The primary purpose of the MAC layer is to transfer MSDUs
between MAC entities.
Question
A system used to interconnect a set of basic service sets and LANs to create an extended service set is a _________.

A)distribution system
B)coordination function
C)MAC data unit
D)wireless access system
Question
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Question
The wireless environment consists of three components that provide point of attack: the wireless client,the transmission medium,and the _________.
Question
Like TKIP,CCMP provides two services: message integrity and ________.
Question
A ____________ attack involves persuading a user and an access point to believe that they are talking to each other when in fact the communication is going through an intermediate attacking device.
Question
The principal threats to wireless transmission are disruption,_____________,and altering or inserting messages.
Question
______ is the recommended technique for wireless network security.

A)Using encryption
B)Using anti-virus and anti-spyware software
C)Turning off identifier broadcasting
D)All of the above
Question
The MPDU exchange for distributing pairwise keys is known as the _______.

A)pseudorandom function
B)cryptographic function
C)nonce
D)4-way handshake
Question
The lowest layer of the IEEE 802 reference model is the __________ layer.
Question
The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n)____________.

A)extended service set
B)MPDU
C)MSDU
D)station
Question
The smallest building block of a wireless LAN is a ______.

A)BSS
B)ESS
C)WPA
D)CCMP
Question
The fields preceding the MSDU field are referred to as the _________.
Question
A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i. A,pre-shared key
B)master session key
C)pairwise master key
D)group master key
Question
The specification of a protocol,along with the chosen key length,is known as a ___.

A)distribution set
B)open system
C)cipher suite
D)realm
Question
Two types of countermeasures are appropriate to deal with eavesdropping: signal-hiding techniques and ____________.
Question
The final form of the 802.11i standard is referred to as ________.

A)WEP
B)RSN
C)Wi-Fi
D)WPA
Question
In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________,a set of security mechanisms that eliminates most 802.11 security issues,as a Wi-Fi standard.

A)WPA
B)WEP
C)RSN
D)MAC
Question
The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.

A)CRC
B)MPDU
C)MAC
D)MSDU
Question
A __________ attack targets wireless access points that are exposed to non-filtered network traffic,such as routing protocol messages or network management messages.
Question
The security requirements are: confidentiality,integrity,availability,authenticity,and __________.
Question
There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.
Question
The 802.11i RSN security specification defines the following services: authentication,privacy with message integrity,and ________.
Question
The field following the MSDU field is referred to as the ___________.
Question
At the top level of the group key hierarchy is the ___________.
Question
The two services involved with the distribution of messages within a DS are distribution and _________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 24: Wireless Network Security
1
The transmission medium carries the radio waves for data transfer.
True
2
CRC is an error detecting code.
True
3
The association service enables transfer of data between a station
on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
False
4
A wireless client can be _______.

A)a cell phone
B)a Wi-Fi enabled laptop
C)a Bluetooth device
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The most significant source of risk in wireless networks in the
underlying communications medium.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
In most data-link control protocols,the data-link protocol entity is
responsible not only for detecting errors using the CRC,but for
recovering from those errors by retransmitting damaged frames.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
A(n)__________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.

A)ESS
B)access point
C)distribution system
D)MPDU
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The wireless access point provides a connection to the network or
service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The MAC service data unit contains any protocol control
information needed for the functioning of the MAC protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Any device that contains an IEEE 802.11 conformant MAC and
physical layer is a basic service set.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The purpose of the discovery phase is for an STA and an AP to
recognize each other,agree on a set of security capabilities,and establish an association for future communication using those security capabilities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
WPA2 incorporates all of the features of the IEEE 802.11i WLAN
security specifications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Company wireless LANs or wireless access points to wired LANs in
close proximity may create overlapping transmission ranges.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

A)DoS
B)man-in-the-middle
C)network injection
D)identity theft
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
An extended service set (ESS)is a set of stations controlled by a
single coordination function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The purpose of the authentication phase is to maintain backward
compatibility with the IEEE 802.11 state machine.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The concerns for wireless security,in terms of threats,and
countermeasures,are different to those found in a wired environment, such as an Ethernet LAN or a wired wide-area network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
An example of a __________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.

A)identity theft
B)ad hoc network
C)network injection
D)man-in-the-middle
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A wireless access point is a _______.

A)cell tower
B)Wi-Fi hot spot
C)wireless access point to a LAN or WAN
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The primary purpose of the MAC layer is to transfer MSDUs
between MAC entities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A system used to interconnect a set of basic service sets and LANs to create an extended service set is a _________.

A)distribution system
B)coordination function
C)MAC data unit
D)wireless access system
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The wireless environment consists of three components that provide point of attack: the wireless client,the transmission medium,and the _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Like TKIP,CCMP provides two services: message integrity and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A ____________ attack involves persuading a user and an access point to believe that they are talking to each other when in fact the communication is going through an intermediate attacking device.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The principal threats to wireless transmission are disruption,_____________,and altering or inserting messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
______ is the recommended technique for wireless network security.

A)Using encryption
B)Using anti-virus and anti-spyware software
C)Turning off identifier broadcasting
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The MPDU exchange for distributing pairwise keys is known as the _______.

A)pseudorandom function
B)cryptographic function
C)nonce
D)4-way handshake
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The lowest layer of the IEEE 802 reference model is the __________ layer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n)____________.

A)extended service set
B)MPDU
C)MSDU
D)station
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The smallest building block of a wireless LAN is a ______.

A)BSS
B)ESS
C)WPA
D)CCMP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The fields preceding the MSDU field are referred to as the _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i. A,pre-shared key
B)master session key
C)pairwise master key
D)group master key
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The specification of a protocol,along with the chosen key length,is known as a ___.

A)distribution set
B)open system
C)cipher suite
D)realm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Two types of countermeasures are appropriate to deal with eavesdropping: signal-hiding techniques and ____________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The final form of the 802.11i standard is referred to as ________.

A)WEP
B)RSN
C)Wi-Fi
D)WPA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________,a set of security mechanisms that eliminates most 802.11 security issues,as a Wi-Fi standard.

A)WPA
B)WEP
C)RSN
D)MAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.

A)CRC
B)MPDU
C)MAC
D)MSDU
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A __________ attack targets wireless access points that are exposed to non-filtered network traffic,such as routing protocol messages or network management messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The security requirements are: confidentiality,integrity,availability,authenticity,and __________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The 802.11i RSN security specification defines the following services: authentication,privacy with message integrity,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The field following the MSDU field is referred to as the ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
At the top level of the group key hierarchy is the ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The two services involved with the distribution of messages within a DS are distribution and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.