Wireless LAN Security

Ace your homework & exams now with Quizwiz!

What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use?

24bit

What type of wireless local area network (WLAN) attack could cost an employee their job because network usage logs point directly to the employee whenever a hacker gains access to the employee's domain login information and causes havoc on the network?

A passive attack.

What is a man-in-the-middle attack on a wireless local area network (WLAN)?

A situation in which a hacker uses an access point (AP) to effectively hijack mobile nodes (clients) by sending a stronger signal than the legitimate AP is sending.

How can filtering augment some of the security limitations of Wired Equivalent Privacy (WEP) in a wireless local area network (WLAN)?

By defining parameters to which client stations must adhere in order to gain access to the network.

Which term describes a wireless system in which the access point (AP) removes the wireless local area network's (WLAN) service set identifier (SSID) from the beacon frames?

Closed system.

For maximum security, you should base your wireless local area network (WLAN) user authentication on which one of the following?

Device-independent schemes, such as user names and passwords.

How might a wireless local area network (WLAN) administrator ensure compliance with security audits?

Document audit procedures in the security policy.

What basis does a wireless local area networks (WLAN) use an Institute of Electrical and Electronics Engineers (IEEE) 802.1x protocol to control network access?

Port-based network access control (PNAC).

To prevent hacker access to passwords and Internet protocol (IP) addresses, why would you want to place wireless access points (AP) on switches instead of hubs?

Switches prevent the broadcast of packets to all network segments.

Access points (AP) must support what encryption techniques in order to comply with Institute of Electrical and Electronics Engineers (IEEE) 802.11i security standards?

Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), and AES-CCMP (Counter-Mode/CBC-MAC Protocol).


Related study sets

Abeka Grammar & Composition V Test 1

View Set

Automata Re-Exam, Finite Automata & Regular Expressions, Chapter 2: Finite Automata, CS317, Finite Automata & Regular Expressions, Chapter 2: Finite Automata, Finite Automata, Theory of Automata, Time Complexity, Time Complexity, Sipser - Theory of C...

View Set

Chapter 3 (no 3.4) - Self-Check Questions

View Set

Chapter 15: Partly Developed States

View Set

chapter 6. cost-volume-profit relationships

View Set

AD Banker Life & Health Chapter 3

View Set

Geology Final (All tests combined)

View Set