chapter 7 111

¡Supera tus tareas y exámenes ahora con Quizwiz!

18) In what initial authentication mode of 802.11i is a central authentication server used? A) 802.1X B) PSK C) both A and B D) neither A nor B

A) 802.1X

4) In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server

A) access point

10) 802.11i 802.1X initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points

A) corporations with multiple access points

5) The protection of communication between a wireless client and the access point is ________. A) link security B) end-to-end security C) both A and B D) neither A nor B

A) link security

7) Which offers stronger security? A) WPA B) 802.11i C) both A and B offer equally strong security.

B) 802.11i

17) If a firm has many access points, it should use ________ initial authentication mode in 802.11i. A) PSK B) 802.1X C) IPsec D) WPA

B) 802.1X

12) In 802.11i ________, hosts must know a shared initial key. A) 802.1X initial authentication mode B) PSK initial authentication mode C) both A and B D) neither A nor B

B) PSK initial authentication mode

13) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) pairwise session C) 802.1X D) preshared

B) pairwise session

9) 802.11i PSK initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points

B) residences with a single access point

19) In 802.1x initial authentication mode, the authenticator is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above

B) wireless access point

16) In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 8 B) 12 C) 20 D) 128

C) 20

6) The Wi-Fi Alliance calls 802.11i ________. A) WEP B) WPA C) WPA2 D) none of the above

C) WPA2

15) Which of the following is a risk in 802.11i PSK mode? A) Unauthorized sharing of the pre-shared key. B) A weak passphrase may be selected. C) both A and B D) neither A nor B

C) both A and B

3) 802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B

C) both A and B

8) What is the strongest security protocol for 802.11 today? A) 802.11s B) 802.11X C) WPA D) 802.11i

D) 802.11i

11) Communication after authentication is protected most strongly if the ________ initial authentication is used. A) PSK B) 802.1X C) WPA D) It does not matter which initial authentication mode is used.

D) It does not matter which initial authentication mode is used.

14) After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) the preshared key B) an 802.1X key C) WPA keys D) different pairwise session keys

D) different pairwise session keys

2) If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________. A) still protected by a firewall B) still protected by encryption C) both A and B D) neither A nor B

D) neither A nor B

20) In 802.1x initial authentication mode, the VERIFIER is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above

D) none of the above

1) Nearly all public Wi-Fi hotspots encrypt your transmissions. `

False


Conjuntos de estudio relacionados

International Marketing chapter 14,15,16,18&19

View Set

Reverse Raffle - AR verb conjugations

View Set

Business Analytics 2600 Final Exam Review

View Set

PHYS 108: Physical Science II Test 4

View Set