Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Media Study
Q:
Some writers prefer to turn off SSID broadcasting.
Q:
An unauthorized access point set up by individuals or departments is called a(n) ________ access point.
A) rogue
B) evil twin
C) Both A and B
D) Neither A nor B
Q:
Wireless IDSs get their data from the company's access points.
Q:
In pre-shared key mode, a passphrase should be at least ________ characters long?
A) 8
B) 20
C) 64
D) 100
Q:
In 802.11i pre-shared key mode, the initial key is generated ________.
A) automatically
B) from a passphrase
C) from a password
D) None of the above. There is no initial key in 802.11i pre-shared key mode.
Q:
Using a shared initial key is dangerous in ________.
A) WEP
B) WPA pre-shared key mode
C) Both A and B
D) Neither A nor B
Q:
In ________, users authenticate themselves to the access point via the use of a single, shared initial key.
A) WEP
B) 802.11i pre-shared key mode
C) WPA pre-shared key mode
D) All of the above.
Q:
802.11i works in ________ mode.
A) pre-shared key
B) enterprise
C) Both A and B
D) Neither A nor B
Q:
________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying.
A) 802.11i
B) WPA
C) WEP
D) None of the above
Q:
Pre-shared key mode was created for homes and small businesses with a single access point.
Q:
The Wi-Fi Alliance calls 802.11i ________.
A) WPA
B) WPA2
C) WEP
D) None of the above
Q:
________ security uses the RC4 cipher in encryption for confidentiality and the Temporal Key Integrity Protocol for keying and rekeying.
A) 802.11i
B) WPA
C) WEP
D) None of the above
Q:
Many companies continue to use WEP to avoid the cost of reconfiguring all of their access points and clients to 802.11i and because WEP has not been fully cracked yet.
Q:
Firms still choose to use WPA in order to ________.
A) avoid configuration expenses for access points
B) avoid configuration expenses for wireless clients
C) Both A and B
D) Neither A nor B
Q:
Nearly all wireless access points can support 802.11i.
Q:
WEP uses RC4 for fast and therefore cheap encryption.
Q:
RC4 uses WEP for fast and therefore cheap encryption.
Q:
In a large organization, WEP rekeying is inexpensive.
Q:
Attackers can exploit WEPs weaknesses by ________.
A) using WEP cracking software
B) reading two messages encrypted with the same key
C) Both A and B
D) Neither A nor B
Q:
WEP mandates shared keys.
Q:
WEP mandates private keys.
Q:
What mistake did the 802.11i Working Group make when creating IVs?
A) Transmitting IVs in the clear
B) Making the IV too short
C) Both A and B
D) Neither A nor B
Q:
WEP encrypts each frame with a per-frame key that consists of the shared RC4 key plus a 24-bit initialization vector that is different for each frame.
Q:
WEP typically takes ________ to crack today.
A) minutes
B) hours
C) days
D) weeks
Q:
WEP stands for ________.
A) wireless equivalent privacy
B) wireless equivalent policy
C) wired equivalent privacy
D) wired equivalent policy
Q:
The original 802.11 core security protocol, ________, was deeply flawed.
A) 802.11i
B) WPA
C) WEP
D) None of the above. The original core protocol was NOT deeply flawed.
Q:
802.11i offers strong security.
Q:
PEAP is a popular extended EAP protocol.
Q:
In 802.11i, ________ authentication always uses SSL/TLS.
A) inner
B) outer
C) Both A and B
D) Neither A nor B
Q:
In 802.11i, EAP outer authentication takes place before inner authentication.
Q:
What standard did the 802.11 Working Group create to extend 802.1X operation to WLANs with security for EAP?
A) 802.11i
B) 802.1i
C) 802.1Xi
D) None of the above
Q:
CTS frames tell other clients that you have received a RTS frame.
Q:
CTS frames tell other wireless clients that you want to transmit for a given amount of time.
Q:
RTS frames tell other wireless clients that you want to transmit for a given amount of time.
Q:
In addition to deauthenticate messages, an attacker could flood wireless clients with ________.
A) RTS
B) CTS
C) Both A and B
D) Neither A nor B
Q:
A network administrator notices extensive damage to wireless packets. This might indicate a ________ attack.
A) man-in-the-middle
B) SYN/ACK
C) DoS flood attack
D) None of the above
Q:
Flooding the frequency of a wireless network is one method attackers use to affect the network.
Q:
WLAN DoS attacks are designed to affect the ________ of the network.
A) confidentiality
B) integrity
C) availability
D) authentication
Q:
Evil twin access point attacks are most common in ________.
A) secure WLANs
B) public hotspots
C) wired connected networks
D) None of the above
Q:
In a man-in-the-middle attack, ________.
A) an evil twin must have a stronger signal than the legitimate AP
B) an evil twin sends own attacks, impersonating the victim
C) Both A and B
D) Neither A nor B
Q:
In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim.
Q:
Focusing electronic attacks on specific high-value targets is known as whaling.
Q:
Focusing electronic attacks on specific high-value targets is known as promiscuous attacks.
Q:
A ________ can be used to gather network information or user data.
A) RFMON
B) packet sniffer
C) whaling device
D) None of the above
Q:
After gaining wireless access to the private network, the attach can ________.
A) cause harm to internal clients
B) steal data
C) launch external attacks
D) All of the above
Q:
By giving unauthorized users access to a local WLAN means that they are on the local network.
Q:
Rogue access points are unauthorized access points set up by individuals or departments.
Q:
Rogue access points are authorized access points set up by individuals or departments.
Q:
Open networks can be legally accessed by anyone and are frequently posted as such.
Q:
Secure wireless networks can be legally accessed by anyone and are frequently posted as such.
Q:
The most common attack against a wireless network is a ________.
A) man-in-the-middle attack using an evil twin
B) wireless DOS attacks
C) unauthorized network access
D) None of the above
Q:
The most common attack against a wireless network is a wireless DoS attack.
Q:
Which of the following is an example of a wireless attack?
A) Unauthorized network access
B) Man-in-the-middle attack using an evil twin
C) Wireless DOS attacks
D) All of the above
Q:
Wireless 802.11 networks generally have a range of ________.
A) 5 to 10 meters
B) 10 to 30 meters
C) 15 to 45 meters
D) None of the above
Q:
Wireless attacks avoid the access points to limit detection.
Q:
The 802.11 standards were developed by the IEEE 802.11 Working Group.
Q:
The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification.
Q:
EAP uses RADIUS for authentication.
Q:
________ is used by ________ for authentication.
A) EAP, RADUS
B) RADIUS, EAP
C) Both A and B
D) Neither A nor B
Q:
Most central authentication servers are governed by the ________ standard.
A) EAP
B) RADIUS
C) IPsec
D) 802.1X
Q:
When a new EAP authentication is added, software has to be changed on the ________.
A) authenticator
B) central authentication server
C) Both A and B
D) Neither A nor B
Q:
When a new EAP authentication is added, software does not have to be changed on the ________.
A) client
B) authenticator
C) central authentication server
D) No software has to be changed on ANY device
Q:
An EAP failure message is sent to the ________.
A) authentication server
B) authenticator
C) client
D) Any of the above
Q:
An EAP message begins with an ________ message.
A) EAP request
B) EAP accept
C) EAP start
D) EAP response
Q:
An EAP response message may contain ________.
A) a request for a different authentication mechanism
B) a negative acknowledgement
C) Both A and B
D) Neither A nor B
Q:
The authenticator is the ________.
A) workgroup switch
B) central authentication server
C) client
D) None of the above
Q:
Which of the following is a benefit of using a central authentication server in 802.1X?
A) Reduced cost
B) Consistency in authentication
C) Immediacy in access control changes
D) All of the above
Q:
In 802.1X, the heavy authentication work is done on ________.
A) authenticators
B) clients
C) Both A and B
D) Neither A nor B
Q:
The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.
Q:
________ is called Port-Based Access Control.
A) 802.11i
B) 802.1X
C) Both A and B
D) Neither A nor B
Q:
Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs.
A) wired, wireless
B) wireless, wired
C) about an equal concern for wired and wireless LANs
D) None of the above
Q:
Access control is more of a problem for wired LANs than for wireless LANs.
Q:
Traditionally, Ethernet LANs offered no access security.
Q:
________ is/are effective method(s) to preventing ARP poisoning attacks.
A) Static tables
B) Limiting local access
C) Both A and B
D) Neither A nor B
Q:
In a MITM attack, access to the local network is not required in order to work.
Q:
In normal ARP traffic, every host can make ARP requests.
Q:
In normal ARP traffic, generally an attacker on the same network cannot see traffic between two hosts.
Q:
One problem with ARP requests and replies is that they do not require authentication of verification.
Q:
Rerouting traffic using ARP poisoning is an attack on ________ of a network.
A) functionality
B) confidentiality
C) Both A and B
D) None of the above
Q:
ARP is used to resolve 32-bit IP addresses into 48-bit local MAC addresses.