Deck 4: Secure Networks

Full screen (f)
exit full mode
Question
Which of the following is NOT one of the four goals to consider when creating a secure networking environment?

A) Confidentiality
B) Integrity
C) Functionality
D) Cost
Use Space or
up arrow
down arrow
to flip the card.
Question
________ refer to ways of attacking networks.

A) Attack vectors
B) Tethering
C) DoS attacks
D) Indirect attacks
Question
The castle model describes when ________.

A) network administrators restrict access to those on the outside of the business and limit access on the inside
B) the good guys are on the inside and the attackers are on the outside
C) network administrators restrict access to only those that should have access within the company
D) computer software restricts access on the inside to the top management and limits access to lower levels in the company
Question
________ describes the idea that creating a 100 percent secure network is not possible.

A) The castle model
B) The death of the perimeter
C) The city model
D) Attack vectors
Question
IDS refers to ________.

A) internal intrusion detection
B) internal interruption detection
C) instantaneous intrusion determination
D) industry intrusion detection
Question
Functionality and access control are two of the four goals to consider when securing networks.
Question
DoS attacks are one of the least common types of network attacks against corporations.
Question
In the castle model of network defense, there was a well-guarded single point of entry.
Question
The "death of the perimeter"
model has no distinct perimeter and there are multiple ways of entering the network.
Question
When a "bad guy"
ends up being an employee, "death of the perimeter"
is confirmed.
Question
________ attempts to make a server or network unavailable to legitimate users.

A) DoS attack
B) The castle model
C) The death of the perimeter
D) The city model
Question
The ultimate goal of a DoS attack is ________.

A) to cause harm
B) financial gain
C) to disrupt business activities
D) to access a business' inventory
Question
A common occurrence with news aggregators like Slashdot or The Huffington Post is ________.

A) referrals from large sites
B) degrading services
C) stopping critical services
D) faulty coding
Question
Which of the following is NOT one of the main DoS attack methods?

A) Direct/indirect
B) Intermediary
C) Reflected
D) Degrade services
Question
Which of the following is the simplest form of a DoS attack?

A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
Question
A DoS attack begins when a ________ sends a signal for the bots to attack a victim.

A) botmaster
B) bot
C) DDoS
D) DoS
Question
Which of the following is the second primary DoS method used by attackers?

A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
Question
________ is the process of hiding an attacker's source IP address.

A) IP flooding
B) Backscattering
C) DDoSs
D) Spoofing
Question
Which of the following occurs when an attacker sends numerous TCP SYN segments to a victim server?

A) SYN flood
B) Ping flood
C) Backscatter
D) HTTP flood
Question
A side effect of an attacker spoofing an IP address is ________.

A) SYN flood
B) ping flood
C) backscatter
D) spoofing
Question
A ________ is similar to a P2P redirect.

A) SYN flood
B) reflected attack
C) Smurf flood
D) DDoS
Question
DoS attacks occur on a weekly basis, not usually daily.
Question
The most common service targeted by attackers is HTTP.
Question
DoS attacks can cause harm by stopping a critical service.
Question
DoS attacks can cause harm by slowly degrading services over time.
Question
Typically DoS attacks against critical services are difficult to identify and last for a long time.
Question
Intermediaries are typically referred to as bots.
Question
Rate limiting can be used to reduce a certain type of traffic to a reasonable amount.
Question
Black-holing an attacker is a poor long-term strategy because attackers can quickly change source IP addresses.
Question
Which of the following is a network attack that manipulates host ARP tables to reroute LAN traffic?

A) SYN flood
B) Ping flood
C) ARP poisoning
D) HTTP flood
Question
________ uses false ARP replies to map any IP address to any MAC address.

A) An ARP reply
B) An ARP request
C) ARP poisoning
D) ARP spoofing
Question
A gateway records all internal IP addresses in its ________.

A) ARP table
B) ARP reply
C) ARP request
D) static table
Question
ARP poisoning can be prevented by using ________.

A) static IP and ARP tables
B) ARP requests and ARP replies
C) dynamic IP and ARP tables
D) ARP spoofing
Question
A difficulty in using static IP and ARP tables is that organizations change.
Question
A(n) ________ sits in his or her car outside of the walls of a company in order to access a system.

A) EAP
B) packet sniffer
C) drive-by hacker
D) botmaster
Question
Most wireless communication in LANs is used to link wireless clients to a firm's wired Ethernet network.
Question
Wireless LANs are not possible.
Question
Wireless traffic often is encrypted in ways that are quite difficult to crack.
Question
The ________ standard provides access control to prevent illegitimate clients from associating with a network.

A) 802.1X
B) RADIUS
C) 802.11
D) IEEE 802.11
Question
The name of the 802.1X standard is ________.

A) IEEE 802.11
B) Port-based Access Control
C) Extensible Authentication Protocol
D) RADIUS
Question
In an 802.1X standard, when a computer first connects, the port is in a(n) ________ state.

A) authorized
B) unauthorized
C) static
D) confidential
Question
In an 802.1X standard, a ________is the primary point of control.

A) switch port
B) wireless connection
C) static table
D) PEAP
Question
Which of the following is NOT an advantage in using a central authentication server instead of each workgroup switch to do all the work?

A) Cost savings
B) Immediate changes
C) Integrity
D) Consistency
Question
In 802.1X, a computer seeking access is the ________.

A) supplicant
B) intermediary
C) botmaster
D) authenticator
Question
802.1X calls the workgroup switch the ________.

A) pass-through operation
B) RADIUS server
C) EAP
D) authenticator
Question
________ governs the specifics of authentication interactions.

A) The central authentication server
B) EAP
C) Pass-through operations
D) A RADIUS server
Question
An ________ passes a message through.

A) authentication switch
B) Ethernet switch
C) EAP
D) authenticator
Question
RADIUS is a(n) ________ protocol.

A) Extensible Authentication
B) client/server
C) VPN
D) Address Resolution
Question
The RADIUS protocol provides ________.

A) authentication and integrity
B) authentication and authorization
C) authenticity and functionality
D) confidentiality and access control
Question
802.1X is quite challenging to implement in wired LANs.
Question
Using a central authentication server brings consistency in authentication.
Question
Ethernet switches can sense when a host connects to one of its ports.
Question
RADIUS provides auditing of connections.
Question
Which of the following is NOT accurate about wireless networks over wired networks?

A) Wireless are quicker.
B) Wireless are easier.
C) Wireless are less expensive.
D) Wireless are rare to find.
Question
Wireless attacks focus on the ________.

A) evil twin access point
B) switch port
C) access point
D) MAC access control point
Question
Connecting to a network without permission is known as ________.

A) secure access
B) unauthorized access
C) a client/server attack
D) rogue access
Question
Which of the following is FALSE about open wireless networks?

A) They are often posted for the public to know about.
B) They can be legally accessed by anyone.
C) They are typically found in public places like coffee shops.
D) They are legally accessed only by staff of the company or owned network.
Question
A(n) ________ can be used to gather user data.

A) static IP table
B) ARP tables
C) RTS frame
D) packet sniffer
Question
What is RFMON?

A) Radio frequency monitoring
B) Radio frequency mode
C) Request frequency monitoring
D) Radio frame monitoring
Question
________ is when attackers focus electronic attacks on specific high-value targets.

A) ARP poisoning
B) Whaling
C) Radio frequency monitoring
D) Rate limiting
Question
A(n) ________ is a personal computer that has software to allow the computer to masquerade as an access point.

A) switch port
B) access point
C) MAC access control point
D) evil twin access point
Question
________ transmit on 2.4-GHz and/or 5-GHz frequency bands.

A) Ethernet networks
B) ARP requests and ARP replies
C) Wireless 802.11 networks
D) Wired 802.11 networks
Question
________ is also known as radio frequency interference.

A) Electromagnetic interference
B) Noise
C) Whaling
D) An evil twin access point
Question
Which of the following record all signals, including packet transmissions, within a radio frequency band?

A) Ethernet networks
B) ARP requests and ARP replies
C) Spectrum analyzers
D) EMIs
Question
________ tell wireless clients that you want to transmit for a given amount of time.

A) CTS frames
B) RTS frames
C) Packet injections
D) Deauthenticate messages
Question
________ tell wireless clients that you have received an RTS frame and that they should not transmit until the designated time expires.

A) CTS frames
B) ARP replies
C) Packet injections
D) Deauthenticate messages
Question
________ assumes that the connection between supplicant and authenticator is secure. Additional security is needed between the supplicant and the access point in 802.11 WLANs.

A) EAP
B) PEAP
C) WEP
D) WPA
Question
What does the first "P" in PEAP stand for?

A) Priority
B) Protected
C) Packet
D) Prioritized
Question
________ is a standard created by the Wi-Fi Alliance by taking an early draft of the 802.11i standard.

A) WEP
B) WPA
C) WLAN
D) WPA2
Question
Which of the following was released in 2018?

A) WPA3
B) WPA
C) WEP
D) WPA2
Question
Which of the following was released in 2018?

A) WPA3
B) WPA
C) WEP
D) WPA2
Question
In 802.11i or WPA in PSK/personal mode, passphrases must be at least ________.

A) 20 characters long
B) 56 characters long
C) 256 characters long
D) 512 characters long
Question
To work with an access point, a station must know the access point's ________.

A) MAC address
B) SSID
C) WPA
D) WEP
Question
Ethernet LANs are the only type of networks that require security.
Question
Wireless LANs have fewer security issues to consider than do wired LANs.
Question
An open network can be legally accessed by anyone.
Question
Promiscuous mode allows an attacker to receive messages addressed to other users.
Question
Evil twin access point attacks are less commonly found in public hot spots.
Question
Interference damages an 802.11 signal and makes packets unreadable.
Question
PSK/personal mode was created for individual users in a larger corporation.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/81
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Secure Networks
1
Which of the following is NOT one of the four goals to consider when creating a secure networking environment?

A) Confidentiality
B) Integrity
C) Functionality
D) Cost
Cost
2
________ refer to ways of attacking networks.

A) Attack vectors
B) Tethering
C) DoS attacks
D) Indirect attacks
Attack vectors
3
The castle model describes when ________.

A) network administrators restrict access to those on the outside of the business and limit access on the inside
B) the good guys are on the inside and the attackers are on the outside
C) network administrators restrict access to only those that should have access within the company
D) computer software restricts access on the inside to the top management and limits access to lower levels in the company
the good guys are on the inside and the attackers are on the outside
4
________ describes the idea that creating a 100 percent secure network is not possible.

A) The castle model
B) The death of the perimeter
C) The city model
D) Attack vectors
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
5
IDS refers to ________.

A) internal intrusion detection
B) internal interruption detection
C) instantaneous intrusion determination
D) industry intrusion detection
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
6
Functionality and access control are two of the four goals to consider when securing networks.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
7
DoS attacks are one of the least common types of network attacks against corporations.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
8
In the castle model of network defense, there was a well-guarded single point of entry.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
9
The "death of the perimeter"
model has no distinct perimeter and there are multiple ways of entering the network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
10
When a "bad guy"
ends up being an employee, "death of the perimeter"
is confirmed.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
11
________ attempts to make a server or network unavailable to legitimate users.

A) DoS attack
B) The castle model
C) The death of the perimeter
D) The city model
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
12
The ultimate goal of a DoS attack is ________.

A) to cause harm
B) financial gain
C) to disrupt business activities
D) to access a business' inventory
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
13
A common occurrence with news aggregators like Slashdot or The Huffington Post is ________.

A) referrals from large sites
B) degrading services
C) stopping critical services
D) faulty coding
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT one of the main DoS attack methods?

A) Direct/indirect
B) Intermediary
C) Reflected
D) Degrade services
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is the simplest form of a DoS attack?

A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
16
A DoS attack begins when a ________ sends a signal for the bots to attack a victim.

A) botmaster
B) bot
C) DDoS
D) DoS
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is the second primary DoS method used by attackers?

A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
18
________ is the process of hiding an attacker's source IP address.

A) IP flooding
B) Backscattering
C) DDoSs
D) Spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following occurs when an attacker sends numerous TCP SYN segments to a victim server?

A) SYN flood
B) Ping flood
C) Backscatter
D) HTTP flood
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
20
A side effect of an attacker spoofing an IP address is ________.

A) SYN flood
B) ping flood
C) backscatter
D) spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
21
A ________ is similar to a P2P redirect.

A) SYN flood
B) reflected attack
C) Smurf flood
D) DDoS
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
22
DoS attacks occur on a weekly basis, not usually daily.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
23
The most common service targeted by attackers is HTTP.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
24
DoS attacks can cause harm by stopping a critical service.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
25
DoS attacks can cause harm by slowly degrading services over time.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
26
Typically DoS attacks against critical services are difficult to identify and last for a long time.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
27
Intermediaries are typically referred to as bots.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
28
Rate limiting can be used to reduce a certain type of traffic to a reasonable amount.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
29
Black-holing an attacker is a poor long-term strategy because attackers can quickly change source IP addresses.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a network attack that manipulates host ARP tables to reroute LAN traffic?

A) SYN flood
B) Ping flood
C) ARP poisoning
D) HTTP flood
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
31
________ uses false ARP replies to map any IP address to any MAC address.

A) An ARP reply
B) An ARP request
C) ARP poisoning
D) ARP spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
32
A gateway records all internal IP addresses in its ________.

A) ARP table
B) ARP reply
C) ARP request
D) static table
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
33
ARP poisoning can be prevented by using ________.

A) static IP and ARP tables
B) ARP requests and ARP replies
C) dynamic IP and ARP tables
D) ARP spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
34
A difficulty in using static IP and ARP tables is that organizations change.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ________ sits in his or her car outside of the walls of a company in order to access a system.

A) EAP
B) packet sniffer
C) drive-by hacker
D) botmaster
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
36
Most wireless communication in LANs is used to link wireless clients to a firm's wired Ethernet network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
37
Wireless LANs are not possible.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
38
Wireless traffic often is encrypted in ways that are quite difficult to crack.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
39
The ________ standard provides access control to prevent illegitimate clients from associating with a network.

A) 802.1X
B) RADIUS
C) 802.11
D) IEEE 802.11
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
40
The name of the 802.1X standard is ________.

A) IEEE 802.11
B) Port-based Access Control
C) Extensible Authentication Protocol
D) RADIUS
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
41
In an 802.1X standard, when a computer first connects, the port is in a(n) ________ state.

A) authorized
B) unauthorized
C) static
D) confidential
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
42
In an 802.1X standard, a ________is the primary point of control.

A) switch port
B) wireless connection
C) static table
D) PEAP
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is NOT an advantage in using a central authentication server instead of each workgroup switch to do all the work?

A) Cost savings
B) Immediate changes
C) Integrity
D) Consistency
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
44
In 802.1X, a computer seeking access is the ________.

A) supplicant
B) intermediary
C) botmaster
D) authenticator
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
45
802.1X calls the workgroup switch the ________.

A) pass-through operation
B) RADIUS server
C) EAP
D) authenticator
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
46
________ governs the specifics of authentication interactions.

A) The central authentication server
B) EAP
C) Pass-through operations
D) A RADIUS server
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
47
An ________ passes a message through.

A) authentication switch
B) Ethernet switch
C) EAP
D) authenticator
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
48
RADIUS is a(n) ________ protocol.

A) Extensible Authentication
B) client/server
C) VPN
D) Address Resolution
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
49
The RADIUS protocol provides ________.

A) authentication and integrity
B) authentication and authorization
C) authenticity and functionality
D) confidentiality and access control
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
50
802.1X is quite challenging to implement in wired LANs.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
51
Using a central authentication server brings consistency in authentication.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
52
Ethernet switches can sense when a host connects to one of its ports.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
53
RADIUS provides auditing of connections.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is NOT accurate about wireless networks over wired networks?

A) Wireless are quicker.
B) Wireless are easier.
C) Wireless are less expensive.
D) Wireless are rare to find.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
55
Wireless attacks focus on the ________.

A) evil twin access point
B) switch port
C) access point
D) MAC access control point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
56
Connecting to a network without permission is known as ________.

A) secure access
B) unauthorized access
C) a client/server attack
D) rogue access
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is FALSE about open wireless networks?

A) They are often posted for the public to know about.
B) They can be legally accessed by anyone.
C) They are typically found in public places like coffee shops.
D) They are legally accessed only by staff of the company or owned network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
58
A(n) ________ can be used to gather user data.

A) static IP table
B) ARP tables
C) RTS frame
D) packet sniffer
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
59
What is RFMON?

A) Radio frequency monitoring
B) Radio frequency mode
C) Request frequency monitoring
D) Radio frame monitoring
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
60
________ is when attackers focus electronic attacks on specific high-value targets.

A) ARP poisoning
B) Whaling
C) Radio frequency monitoring
D) Rate limiting
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
61
A(n) ________ is a personal computer that has software to allow the computer to masquerade as an access point.

A) switch port
B) access point
C) MAC access control point
D) evil twin access point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
62
________ transmit on 2.4-GHz and/or 5-GHz frequency bands.

A) Ethernet networks
B) ARP requests and ARP replies
C) Wireless 802.11 networks
D) Wired 802.11 networks
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
63
________ is also known as radio frequency interference.

A) Electromagnetic interference
B) Noise
C) Whaling
D) An evil twin access point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following record all signals, including packet transmissions, within a radio frequency band?

A) Ethernet networks
B) ARP requests and ARP replies
C) Spectrum analyzers
D) EMIs
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
65
________ tell wireless clients that you want to transmit for a given amount of time.

A) CTS frames
B) RTS frames
C) Packet injections
D) Deauthenticate messages
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
66
________ tell wireless clients that you have received an RTS frame and that they should not transmit until the designated time expires.

A) CTS frames
B) ARP replies
C) Packet injections
D) Deauthenticate messages
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
67
________ assumes that the connection between supplicant and authenticator is secure. Additional security is needed between the supplicant and the access point in 802.11 WLANs.

A) EAP
B) PEAP
C) WEP
D) WPA
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
68
What does the first "P" in PEAP stand for?

A) Priority
B) Protected
C) Packet
D) Prioritized
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
69
________ is a standard created by the Wi-Fi Alliance by taking an early draft of the 802.11i standard.

A) WEP
B) WPA
C) WLAN
D) WPA2
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following was released in 2018?

A) WPA3
B) WPA
C) WEP
D) WPA2
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following was released in 2018?

A) WPA3
B) WPA
C) WEP
D) WPA2
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
72
In 802.11i or WPA in PSK/personal mode, passphrases must be at least ________.

A) 20 characters long
B) 56 characters long
C) 256 characters long
D) 512 characters long
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
73
To work with an access point, a station must know the access point's ________.

A) MAC address
B) SSID
C) WPA
D) WEP
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
74
Ethernet LANs are the only type of networks that require security.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
75
Wireless LANs have fewer security issues to consider than do wired LANs.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
76
An open network can be legally accessed by anyone.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
77
Promiscuous mode allows an attacker to receive messages addressed to other users.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
78
Evil twin access point attacks are less commonly found in public hot spots.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
79
Interference damages an 802.11 signal and makes packets unreadable.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
80
PSK/personal mode was created for individual users in a larger corporation.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 81 flashcards in this deck.