Module 5 chapter 11
The 802.11 is a set of specifications for OSI layer ______.
1 and 2
NAC is often implemented around white-listing or authenticating devices using a:
MAC
The implementation of this technology enabled binding channels (data streams) to reach speeds of 600 Mbps.
MIMO
An ephemeral, random value, often used in cryptographic schemes is often referred to as a: Group of answer choices
Nonce
WPA introduced this to fix WEP's problem with an attack against weak initialization vectors.
TKIP
The first version of 802.11 specified transmissions with data rates _________.
between 1 and 2 Mbps
An infrastructure network has a central device that all devices communicate with, but also allows devices to directly communicate with one another without having to go through the central device.
false
WPS is considered a more secure authentication mechanism over:
none of the above
Access points send out beacon frames and clients send out probe requests. Group of answer choices
true
An ad hoc network can be considered a dynamic mesh network. Group of answer choices
true
Bluesnarfing is considered to create more of an impact thank bluejacking.
true
Configuring your wireless interface to "monitor mode" enables:
your device to see other networks and devices connected to those wireless networks without being connected to any wireless network.
A four-way handshake is completed in both WPA and WPA2
False
A wireless device client must first associate to the wireless network before it can attempt to authenticate to the access point.
False
CRC is considered stronger than the MIC.
False
In the United States, there are 13 channels that can be used for Wi-Fi communications in the2.4 GHz band.
False
WPA differed from WEP in that it enabled session keys where WEP did not.
False
WPA-Personal is less secure than WPA-Enterprise and is primarily used because consumer-home devices aren't typically equipped to support the more stringent encryption algorithms.
False
WEP uses one of two key sizes, _____ or ______, for the RC4 encryption algorithm.
40, 104
Enterprise authentication uses _______ to handle user-level authentication. Group of answer choices
802.1x