IS3120 CHAPTER 6 Flashcards

1
Q

A server that provides authentication, authorization, and accounting for a network

A

AAA server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system that uses a public key to encode data and a private key to decrypt data

A

Asymmetric encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A WLAN network that includes an access point

A

Basic Service Set (BSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The number of nodes and the amount of shared bandwidth available to each node and coverage

A

Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A modulation scheme defined in the IEEE 802.11b standard

A

Complementary code keying (CCK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The attempt to provide the same level of signal strength to all network nodes.

A

Coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application used to verify that the sender of a document, image, or message is a trusted source.

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A modulation technique included in the IEEE 802.11x standard

A

Direct sequence spread spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adapts the nominal bit rate of a wireless node to better use a communication channel.

A

Dynamic rate shifting (DRS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A WLAN that links together two BSS networks with a common linking device.

A

Extended Service Set (ESS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An authentication method that is used in WLAMs and point-to-point connections

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A peer-to-peer WLAN designation for each node in an ad hoc mode network.

A

Independent Basic Service Set (IBSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The 2.4 GHz bandwidth allocated to unlicensed use and used for 802.b/g/n

A

Industrial, scientific, and medical (ISM) bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cisco Systems’ version of EAP. It supports dynamic key encryption and mutual authentication

A

Lightweight Extensible Authentication Protocol (LEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prevents an attacker from intercepting, modifying, and retransmitting message packets by checking the integrity of a packet using the ICV.

A

Message integrity check (MIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The propagation that results in RF signals reaching the receiving antenna at different times and by two or more different paths.

A

Multipath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An antenna technology that uses multiple antennas (to receive and transmit) at both ends of a transmission.

A

Multiple-input and multiple-output (MIMO)

18
Q

A process through which a node gains access to a wireless network running WEP and access rules that are not encrypted

A

Open System Authentication (OSA)

19
Q

A frequency-division multiplexing (FDM) scheme that applies a digital multi-carrier modulation method

A

Orthogonal frequency division multiplexing (OFDM)

20
Q

A technique that can modulated both analog and digital transmissions

A

Quadrature amplitude modulation(QAM)

21
Q

A process through which a node gains access to a WLAN running the WEP protocol

A

Shared Key Authentication (SKA)

22
Q

A system of encryption that applies the same exact key to encrypt and decrypt data

A

Symmetric encryption system

23
Q

A security protocol used in the IEEE 802.11x wireless standard.

A

Temporal Key Integrity Protocol (TKIP)

24
Q

The 5 GHz frequency band used by IEEE 802.11a devices

A

Unlicensed National Information Infrastructure (UNII)

25
A standard developed by the WiFi Alliance to certify protocols, software, and equipment standards
Wireless fidelity (WiFI)
26
1. The network security standard for all IEEE networks is ___. 1. IEEE 802.11a 2. IEEE 802.11i 3. IEEE 802.1x 4. IEEE 802.3
IEEE 802.1x
27
2. What did WPA add to improve on the WEP protocol? 1. EAP 2. EAPOL 3. RC4 4. TKIP
TKIP
28
3. Which of the following security threats has the primary objective of overloading a network's resources, resulting in the resources becoming unavailable to the network's users? 1. Denial of service 2. Intrusion 3. Interception 4. ARP spoofing
Denial of service
29
4. ___ is used to provide access to a network to users and networking devices. 1. Authorization 2. Accounting services 3. Authentication 4. Certification
Authentication
30
5. A DoS attack is NOT a common security threat to a network. TRUE OR FALSE
FALSE
31
6. What type of protocol does the 802.1x standard prescribe for authentication? 1. TKIP 2. EAP 3. AAA 4. DRS
EAP
32
7. The interference picked up by an RF antenna from other nearby transmitters is ___. 1. EMI 2. Metal box 3. Crosstalk 4. RFI
RFI
33
8. The capability of a WLAN to support a certain number of wireless nodes is called its ___. 1. Capacity 2. Coverage 3. Mode 4. Site survey
Capacity
34
9. What is the designation of a node in an ad hoc WLAN? 1. ESS 2. BSS 3. IBSS 4. SSID
IBSS
35
10. What is the process used to verify the capability of a site or a space to support a WLAN called? 1. Coverage 2. Capacity 3. Site survey 4. Mode
Site survey
36
11. What is the topology of a WLAN that includes only a single access point? 1. BSS 2. ESS 3. IDSS 4. RSSI
BSS
37
12. What is the purpose of a site survey? 1. To perform acceptance testing on a new WLAN installation 2. To ensure that a WLAN design provides sufficient signal strength and bandwidth for all planned stationary or mobile nodes 3. To ensure that each node on a WLAN is functioning properly 4. To verify an existing WLAN meets the requirements for connecting to a wireless WAN
To ensure that a WLAN design provides sufficient signal strength and bandwidth for all planned stationary or mobile nodes
38
13. The distance between a WLAN node and the AP to which it is associated determines the throughput the node experiences. TRUE OR FALSE
TRUE
39
14. What characteristic of the bandwidth of a WLAN is affected by the number of nodes associated with a particular access point? 1. Bandwidth 2. Login 3. Security level 4. Priority
Bandwidth
40
15. Which of the following does not create a serious barrier to the transmission of RF signals? 1. Concrete 2. Leaded glass 3. Open space 4. Water
Open space