final 35
The MPDU exchange for distributing pairwise keys is known as the _______.
4 way handshake
A(n) __________ is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.
Access Point
Security awareness, training, and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ________ and of potential penalties.
Accountability
A principal element of an identity management system is _______.
All the above
______ is the recommended technique for wireless network security.
All the above
_______ is a benefit of security awareness, training, and education programs to organizations.
All the above
The smallest building block of a wireless LAN is a ______.
BSS
The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.
DOS
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user.
Federation
The function of the ________ layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity.
MAC
The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n) ____________.
MPDU
An example of a(n) __________ attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance.
Network Injection
The final form of the 802.11i standard is referred to as ________.
RSN
_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.
Registration
_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.
SOAP
___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.
System integrity verification tools
In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated ________, a set of security mechanisms that eliminates most 802.11 security issues, as a Wi-Fi standard.
WPA
_______ is movement of data in a business process.
Workflow automation
_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance, function, meaning, or context.
XML
A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a ______.
all the above
A wireless access point is a _______.
all the above
A wireless client can be _______.
all the above
From a security point of view, which of the following actions should be done upon the termination of an employee?
all the above
_______ are ways for an awareness program to promote the security message to employees.
all the above
________ can include computer viruses, Trojan horse programs, worms, exploit scripts, and toolkits.
artifacts
The specification of a protocol, along with the chosen key length, is known as a ___.
cipher suite
A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.
company rights
CERT stands for ___________.
computer emergency response team
A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.
disciplinary action
A system used to interconnect a set of basic service sets and LANs to create an extended service set is a _________.
distribution system
The _________ level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.
education and experience
________ need training on the development of risk management goals, means of measurement, and the need to lead by example in the area of security awareness.
executives
A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.
pre shared key
________ is explicitly required for all employees.
security awareness
The _______ category is a transitional stage between awareness and training.
security basics and literacy
________ is the process of receiving, initial sorting, and prioritizing of information to facilitate its appropriate handling.
triage