Deck 18: Wireless Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 18: Wireless Network Security
1
Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.
True
2
In an)__________ situation,a wireless device is configured to appear to be a legitimate access point,enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.
A)malicious association
B)identiy theft
C)network injection
D)ad hoc network
A)malicious association
B)identiy theft
C)network injection
D)ad hoc network
A
3
The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
True
4
The term used for certified 802.11b products is ___________ .
A)WAP
B)Wi-Fi
C)WEP
D)WPA
A)WAP
B)Wi-Fi
C)WEP
D)WPA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Wireless networks,and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The DS can be a switch,a wired network,or a wireless network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The principal threats to wireless transmission are eavesdropping, altering or inserting messages,and disruption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The actual method of key generation depends on the details of the authentication protocol used.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
___________ and links,such as personal network Bluetooth devices,barcode readers,and handheld PDAs,pose a security risk in terms of both eavesdropping and spoofing.
A)DoS
B)Accidental association
C)Nontraditional networks
D)Ad hoc networks
A)DoS
B)Accidental association
C)Nontraditional networks
D)Ad hoc networks
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .
A)physical layer
B)control layer
C)logical link layer
D)media access layer
A)physical layer
B)control layer
C)logical link layer
D)media access layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
You should allow only specific computers to access your wireless network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Sensors and robots,are not vulnerable to physical attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The pairwise master key is derived from the group key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The function of the __________ is to on transmission assemble data into a frame,on reception disassemble frame and perform address recognition and error detection,and govern access to the LAN transmission medium.
A)transmission layer
B)logical layer
C)media access control layer
D)physical layer
A)transmission layer
B)logical layer
C)media access control layer
D)physical layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
IEEE 802.11 is a standard for wireless LANs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The specification of a protocol along with the chosen key length is known as a __________ .
A)extended service
B)distribution system
C)cipher suite
D)RSN
A)extended service
B)distribution system
C)cipher suite
D)RSN
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
To certify interoperability for 802.11b products an industry consortium named the __________ was formed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The __________ layer is responsible for detecting errors and discarding any frames that contain errors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The master session key is also known as the __________ key.
A)AAA
B)GTK
C)MIC
D)STA
A)AAA
B)GTK
C)MIC
D)STA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The first 802.11 standard to gain broad industry acceptance was _________.
A)802.11i
B)802.11a
C)802.11g
D)802.11b
A)802.11i
B)802.11a
C)802.11g
D)802.11b
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
__________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames.
A)transmission
B)media access control
C)logical link control
D)physical layer
A)transmission
B)media access control
C)logical link control
D)physical layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer.
A)station
B)MPU
C)service data unit
D)MSDU
A)station
B)MPU
C)service data unit
D)MSDU
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
In simple terms,the wireless environment consists of three components that provide point of attack: the endpoint,the ______________,and the access point.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
In order to accelerate the introduction of strong security into WLANs,the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other,agree on a set of security capabilities,and establish an association for future communication using those security capabilities.
A)WPA
B)RSN
C)TKIP
D)WAE
A)WPA
B)RSN
C)TKIP
D)WAE
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The __________ is the information that is delivered as a unit between MAC users.
A)MSDU
B)DS
C)MPDU
D)BSS
A)MSDU
B)DS
C)MPDU
D)BSS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Derived from the GMK,the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
____________ can occur when a company's wireless LAN or wireless access points to wired LANs in close proximity and may create overlapping transmission ranges.A user intending to connect to one LAN may unintentionally lock on to a wireless access point from a neighboring network.
A)Network injection
B)Denial of service attacks
C)Man-in-the-middle attacks
D)Accidental association
A)Network injection
B)Denial of service attacks
C)Man-in-the-middle attacks
D)Accidental association
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated.
A)AAA Key
B)GTK
C)PTK
D)PSK
A)AAA Key
B)GTK
C)PTK
D)PSK
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.
A)MIC key
B)EAPOL-KEK
C)EAPOL-KCK
D)TK
A)MIC key
B)EAPOL-KEK
C)EAPOL-KCK
D)TK
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK,to verify the selection of the cipher suite,and to derive a fresh PTK for data sessions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time,__________ are used for communication between a pair of devices typically between a STA and an AP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The main threat involving wireless access points is unauthorized access to the network.The principal approach for preventing success is the __________ standard for port-based network access control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The IEEE 802.11 protocol stack consists of the logical link control layer,the medium access control layer,and the _________ layer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The MPDU authentication phase consists of three phases.They are: connect to AS,EAP exchange and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck