Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide Wireless LANs Study Set 1
Exam 9: Implementing Wireless Lan Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.
Question 2
Essay
Describe Advanced Encryption Standard (AES).
Question 3
Multiple Choice
The personal security model is intended for settings in which a(n) ____ is unavailable.
Question 4
Multiple Choice
What is the name of the 128-bit key used in TKIP?
Question 5
Essay
Describe pre-shared key authentication.
Question 6
Essay
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
Question 7
Essay
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
Question 8
Multiple Choice
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.
Question 9
True/False
The block cipher used in 802.11i is the Data Encryption Standard (DES).
Question 10
True/False
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Question 11
Multiple Choice
____ authentication is used in the enterprise security model using WPA and WPA2.
Question 12
Essay
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
Question 13
Short Answer
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
Question 14
Multiple Choice
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.
Question 15
Essay
What should a business do if the best possible security model cannot be implemented?
Question 16
Multiple Choice
The ____ wireless security standard provides a low level of security.
Question 17
True/False
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
Question 18
Multiple Choice
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.