Chapter 11 Flashcards

1
Q

Lan and Wan

A

802

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is possible to have a wireless network that does not connect to a wired network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which IEEE standard can achieve a throughput of 54 Mbps?

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What TKIP enhancement addressed the WEP vulnerability of forging packets?

A

Message Integrity Check (MIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?

A

supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following channels is available in 802.11b for attempting to prevent overlapping? (Choose all that apply.)

A

1 6 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the 1 to 32 character configurable name used to identify a WLAN?

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following defines how data is placed on a carrier signal?

A

Modulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a utility that is a wireless network detector, sniffer, and an intrusion detection system?

A

Vistumbler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An access point provides which of the following?

A

Access to the DS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disabling SSID broadcasts must be configured on the computer and the AP. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following EAP methods uses TLS to authenticate the server to the client, but not the client to the server?

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?

A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges?

A

channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which wireless encryption standard offers the best security?

A

WPA2

17
Q

Bluetooth technology is more vulnerable to network attacks than WLANs are. True or False?

A

False

18
Q

What protocol was added to 802.11i to address WEP’s encryption vulnerability?

A

TKIP

19
Q

Which of the following typically functions as the 802.1x authenticator, allowing or denying a supplicant’s access to a WLAN?

A

AP

20
Q

What protocol improves WPA encryption by adding Message Integrity Checks, Extended Initialization Vectors, Per-packet key mixing, and a Re-keying mechanism to improve encryption?

A

TKIP

21
Q

Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?

A

WPS

22
Q

What standard specifically defines the process of authenticating and authorizing users on a network?

A

802.1X

23
Q

Which IEEE standard defines authentication and authorization in wireless networks?

A

802.1X

24
Q

What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?

A

FHSS

25
Q

Wardriving requires expensive hardware and software. True or False?

A

False

26
Q

Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network?

A

access point (AP)

27
Q

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

A

True

28
Q

Which tool that can help reduce the risk of a wardriver attacking your WLAN?

A

airbase-ng

29
Q

The IEEE 802.11 standard pertains to which layers and sublayers of the OSI model? (Choose all that apply.)

A

MAC sublayer of the Data Link Layer

Physical layer

30
Q

Kismet is known as which of the following?

A

passive scanner