Lesson 18: Wireless LAN Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What Initialization Vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use?

24 bit. 24 bit. 8 bit. 128 bit. 64 bit.

What type of Wireless Local Area Network (WLAN) attack could cost an employee their job because network usage logs point directly to the employee whenever a hacker gains access to the employee's domain login information and causes havoc on the network?

A passive attack. A man-in-the-middle attack. An active attack. A passive attack. A jamming attack.

What is a man-in-the-middle attack on a Wireless Local Area Network (WLAN)?

A situation in which a hacker uses an Access Point (AP) to effectively hijack mobile nodes (clients) by sending a stronger signal than the legitimate AP is sending. A situation in which a hacker uses an access point (AP) to effectively hijack mobile nodes (clients) by sending a stronger signal than the legitimate AP is sending. A situation in which a hacker enters a WLAN through an access point (AP) to make changes to the wireless LAN itself. A situation in which a hacker does not have to actually connect to an access point (AP) to listen to packets traversing the wireless segment. A situation that regularly occurs whenever many different devices across many different industries share the 2.4 gigahertz (GHz) Industrial, Scientific, and Medical (ISM) radio band with WLANs.

How can filtering augment some of the security limitations of Wired Equivalent Privacy (WEP) in a Wireless Local Area Network (WLAN)?

By defining parameters to which client stations must adhere in order to gain access to the network. By placing encryption shells around the data before transmission and filtering it at the receiver to avoid detection by hackers. By removing overhead from the data so that it can inconspicuously travel through the network without detection by hackers. By defining parameters to which client stations must adhere in order to gain access to the network. By removing unsolicited requests for connections to the network.

Which term describes a wireless system in which the Access Point (AP) removes the Wireless Local Area Network's (WLAN) Service Set Identifier (SSID) from the beacon frames?

Closed system. Beaconless system. Client secured. Hidden system. Closed system.

For maximum security, you should base your Wireless Local Area Network (WLAN) user authentication on which one of the following?

Device-independent schemes, such as user names and passwords. Media access control (MAC) addresses. Device-independent schemes, such as user names and passwords. Security keys with service set identifiers (SSID) that relate to an organization. Service set identifiers (SSID) and media access control (MAC) addresses.

How might a Wireless Local Area Network (WLAN) administrator ensure compliance with security audits?

Document audit procedures in the security policy. Document audit procedures in the security policy. Restrict user network access to work hours only. Perform daily audits of all network devices. Make users responsible for performing self-audits.

Wireless Local Area Networks (WLAN) that use an Institute of Electrical and Electronics Engineers (IEEE) 802.1x protocol control network access on what basis?

Port-based Network Access Control (PNAC). Per-session network access control (PNAC). Per-media access control address (PMAC) . Per-service set identifier (PSSID). Port-based network access control (PNAC).

To prevent hacker access to passwords and Internet Protocol (IP) addresses, why would you want to place wireless Access Points (AP) on switches instead of hubs?

Switches prevent the broadcast of packets to all network segments. Switches prevent the broadcast of packets to all network segments. Hubs enable hackers to localize packets to a specific network segment by preventing the broadcast of all packets to all network segments. Switches implement Application Layer protocol filters to control network utilization. Switches allow for virtual private network (VPN) connectivity.

Access Points (AP) must support what encryption techniques in order to comply with Institute of Electrical and Electronics Engineers (IEEE) 802.11i security standards?

Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), and AES-CCMP (Counter-Mode/CBC-MAC Protocol). Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), and enhanced RC4 stream cipher. Temporal Key Integrity Protocol (TKIP), Digital Encryption Standard (DES), and Advanced Encryption Standard with Counter-Mode/CBC-MAC Protocol (AES-CCMP). Temporal Key Integrity Protocol (TKIP), enhanced RC4 stream cipher, and Advanced Encryption Standard with Counter-Mode/CBC-MAC Protocol (AES-CCMP). Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), and AES-CCMP (Counter-Mode/CBC-MAC Protocol).


Set pelajaran terkait

AP World History: Mock Questions

View Set

DEP2004: Ch. 15 Terms & Practice

View Set

TOPIC 2.2 : REMOVAL OF SUTURE & CLIP/STAPLES

View Set