final 35

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The MPDU exchange for distributing pairwise keys is known as the _______.

4 way handshake

A(n) __________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.

Access Point

Security awareness, training, and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ________ and of potential penalties.

Accountability

A principal element of an identity management system is _______.

All the above

______ is the recommended technique for wireless network security.

All the above

_______ is a benefit of security awareness, training, and education programs to organizations.

All the above

The smallest building block of a wireless LAN is a ______.

BSS

The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

DOS

________ is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user.

Federation

The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.

MAC

The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n) ____________.

MPDU

An example of a(n) __________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.

Network Injection

The final form of the 802.11i standard is referred to as ________.

RSN

_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.

Registration

_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

SOAP

___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.

System integrity verification tools

In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________, a set of security mechanisms that eliminates most 802.11 security issues, as a Wi-Fi standard.

WPA

_______ is movement of data in a business process.

Workflow automation

_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance, function, meaning, or context.

XML

A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a ______.

all the above

A wireless access point is a _______.

all the above

A wireless client can be _______.

all the above

From a security point of view, which of the following actions should be done upon the termination of an employee?

all the above

_______ are ways for an awareness program to promote the security message to employees.

all the above

________ can include computer viruses, Trojan horse programs, worms, exploit scripts, and toolkits.

artifacts

The specification of a protocol, along with the chosen key length, is known as a ___.

cipher suite

A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.

company rights

CERT stands for ___________.

computer emergency response team

A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.

disciplinary action

A system used to interconnect a set of basic service sets and LANs to create an extended service set is a _________.

distribution system

The _________ level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.

education and experience

________ need training on the development of risk management goals, means of measurement, and the need to lead by example in the area of security awareness.

executives

A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

pre shared key

________ is explicitly required for all employees.

security awareness

The _______ category is a transitional stage between awareness and training.

security basics and literacy

________ is the process of receiving, initial sorting, and prioritizing of information to facilitate its appropriate handling.

triage


Set pelajaran terkait

Oceanography Chapter 11: The Living Ocean

View Set

Anthropology- Power and Authority

View Set