Module 5 chapter 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

The 802.11 is a set of specifications for OSI layer ______.

1 and 2

NAC is often implemented around white-listing or authenticating devices using a:

MAC

The implementation of this technology enabled binding channels (data streams) to reach speeds of 600 Mbps.

MIMO

An ephemeral, random value, often used in cryptographic schemes is often referred to as a: Group of answer choices

Nonce

WPA introduced this to fix WEP's problem with an attack against weak initialization vectors.

TKIP

The first version of 802.11 specified transmissions with data rates _________.

between 1 and 2 Mbps

An infrastructure network has a central device that all devices communicate with, but also allows devices to directly communicate with one another without having to go through the central device.

false

WPS is considered a more secure authentication mechanism over:

none of the above

Access points send out beacon frames and clients send out probe requests. Group of answer choices

true

An ad hoc network can be considered a dynamic mesh network. Group of answer choices

true

Bluesnarfing is considered to create more of an impact thank bluejacking.

true

Configuring your wireless interface to "monitor mode" enables:

your device to see other networks and devices connected to those wireless networks without being connected to any wireless network.

A four-way handshake is completed in both WPA and WPA2

False

A wireless device client must first associate to the wireless network before it can attempt to authenticate to the access point.

False

CRC is considered stronger than the MIC.

False

In the United States, there are 13 channels that can be used for Wi-Fi communications in the2.4 GHz band.

False

WPA differed from WEP in that it enabled session keys where WEP did not.

False

WPA-Personal is less secure than WPA-Enterprise and is primarily used because consumer-home devices aren't typically equipped to support the more stringent encryption algorithms.

False

WEP uses one of two key sizes, _____ or ______, for the RC4 encryption algorithm.

40, 104

Enterprise authentication uses _______ to handle user-level authentication. Group of answer choices

802.1x


Conjuntos de estudio relacionados

Macroeconomics Mid-Term Practice

View Set

BSC 1011 Chapter 39 Lecture Presentation

View Set

Pediatric Pathology Lectures 1 & 2

View Set

Module 3 Section 2 - Lecture quiz

View Set

How Insurance Works & Homeowner's Insurance

View Set

3.2 - Aggregate Demand and Aggregate Supply

View Set