Deck 2: Advanced Wireless Testing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 2: Advanced Wireless Testing
1
A(n) ____ is the sequence of characters that is attached to each packet sent over a wireless network and is used to identify that network.
A) access point
B) chipset
C) channel
D) service set ID
A) access point
B) chipset
C) channel
D) service set ID
service set ID
2
A ____ is simply a group of circuits or microchips designed to work together.
A) chipset
B) gateway
C) narrowband
D) channel
A) chipset
B) gateway
C) narrowband
D) channel
chipset
3
____ allows for the interconnecting of any type of fixed network technology and provides separate Quality of Service (QoS) for separate connections.
A) Bluetooth
B) Spread spectrum
C) HiperLAN2
D) Narrowband
A) Bluetooth
B) Spread spectrum
C) HiperLAN2
D) Narrowband
HiperLAN2
4
____ antennas obtain millimeter waves using dielectric guides, microstrip lines, coplanar lines, and slot lines.
A) Leaky wave
B) Omnidirectional
C) Reflector
D) Monopole
A) Leaky wave
B) Omnidirectional
C) Reflector
D) Monopole
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is a piece of wireless communication hardware that creates a central point of wireless connectivity.
A) hot-spot gateway
B) access point
C) wireless gateway
D) wireless router
A) hot-spot gateway
B) access point
C) wireless gateway
D) wireless router
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ provides a guarantee that each data packet has been sent with its own encryption key.
A) Lightweight Extensible Authentication Protocol
B) Temporal Key Integrity Protocol
C) Extensible Authentication Protocol
D) Remote Authentication Dial-In User Service
A) Lightweight Extensible Authentication Protocol
B) Temporal Key Integrity Protocol
C) Extensible Authentication Protocol
D) Remote Authentication Dial-In User Service
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a script that can be run against a file containing raw captured traffic.
A) AirSnort
B) Kismet
C) NetStumbler
D) WEPCrack
A) AirSnort
B) Kismet
C) NetStumbler
D) WEPCrack
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a Linux-based program that exploits the weak-IV (initialization vector) problem inherent in static WEP.
A) AirSnort
B) Kismet
C) NetStumbler
D) WEPCrack
A) AirSnort
B) Kismet
C) NetStumbler
D) WEPCrack
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ tool is a WEP and WPA cracking suite that performs various statistical attacks to discover WEP keys with small amounts of captured data, combined with brute forcing.
A) WEPCrack
B) NetworkView
C) Aircrack-ng
D) Monkey-Jack
A) WEPCrack
B) NetworkView
C) Aircrack-ng
D) Monkey-Jack
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a lightweight, easily configured Domain Name System (DNS) forwarder and Dynamic Host Configuration Protocol (DHCP) server.
A) NetworkView
B) KisMAC
C) Airpwn
D) Dnsmasq
A) NetworkView
B) KisMAC
C) Airpwn
D) Dnsmasq
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck