Deck 9: Wireless LAN Security Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 9: Wireless LAN Security Vulnerabilities
1
A WLAN can contain many entry points,making security more difficult than with a wired LAN.
True
2
Searching for unprotected wireless networks is called what?
A) WLAN trolling
B) war driving
C) battle testing
D) wireless fishing
A) WLAN trolling
B) war driving
C) battle testing
D) wireless fishing
B
3
____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.
A) Integrity
B) Availability
C) Confidentiality
D) Access control
A) Integrity
B) Availability
C) Confidentiality
D) Access control
A
4
Which of the following is NOT an information security layer?
A) products
B) people
C) prevention
D) procedures
A) products
B) people
C) prevention
D) procedures
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?
A) inserting network traffic
B) denial of service
C) hijacking the wireless connection
D) reading data
A) inserting network traffic
B) denial of service
C) hijacking the wireless connection
D) reading data
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ attack on WEP involves identifying two packets derived from the same IV.
A) capture
B) keystream
C) weak key
D) pseudo-random number
A) capture
B) keystream
C) weak key
D) pseudo-random number
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
With WEP,it is impossible for an attacker to identify two packets derived from the same initialization vector.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
A) availability
B) cost
C) security
D) complexity
A) availability
B) cost
C) security
D) complexity
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
WEP guards one of the CIA characteristics,namely what?
A) integrity
B) availability
C) confidentiality
D) access control
A) integrity
B) availability
C) confidentiality
D) access control
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Cleartext that has been encrypted is referred to as which of the following?
A) plaintext
B) cryptography
C) ciphertext
D) keytext
A) plaintext
B) cryptography
C) ciphertext
D) keytext
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Wireless security was implemented well in the original 802.11 standard.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
A user needs to enter the service set identifier manually when which weak security measure is employed?
A) WEP encryption
B) Open System Authentication
C) SSID hiding
D) shared key authentication
A) WEP encryption
B) Open System Authentication
C) SSID hiding
D) shared key authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Attacks that use many computers to attack a single network are called centralized attacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?
A) NIC blocking
B) MAC address filtering
C) Network blocking
D) IP address filtering
A) NIC blocking
B) MAC address filtering
C) Network blocking
D) IP address filtering
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
A key that creates a detectable pattern is referred to as which of the following?
A) repeating key
B) plain key
C) weak key
D) crypto key
A) repeating key
B) plain key
C) weak key
D) crypto key
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which is true about WEP?
A) uses a shared secret key
B) uses a public/private key pair
C) two keys are maintained
D) must be at least 32 bits in length
A) uses a shared secret key
B) uses a public/private key pair
C) two keys are maintained
D) must be at least 32 bits in length
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
A rogue AP can be described as which of the following?
A) an AP whose security settings have not been set
B) an AP designed to mimic an authorized AP
C) an AP that has malfunctioned and allows unauthorized users to access it
D) an unauthorized AP brought into the enterprise network
A) an AP whose security settings have not been set
B) an AP designed to mimic an authorized AP
C) an AP that has malfunctioned and allows unauthorized users to access it
D) an unauthorized AP brought into the enterprise network
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.
A) spoof
B) weak key
C) DoS
D) man-in-the-middle
A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
An attacker spoofs frames to prevent a client from remaining connected to the WLAN.What type of an attack is this?
A) RF jamming
B) man-in-the-middle
C) hijacking
D) denial of service
A) RF jamming
B) man-in-the-middle
C) hijacking
D) denial of service
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)
A) only Windows uses MAC addresses,excluding other OSs from this method
B) MAC addresses can be spoofed
C) the MAC address can be captured by forcing a reassociation
D) MAC address management can be difficult
A) only Windows uses MAC addresses,excluding other OSs from this method
B) MAC addresses can be spoofed
C) the MAC address can be captured by forcing a reassociation
D) MAC address management can be difficult
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Briefly define cryptography.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Describe one weakness of MAC address filtering.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What is a distributed attack?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Describe how an attacker can hijack a wireless connection.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Describe the five steps in the process of WEP encryption.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
List and describe the three characteristics of information that must be protected by information security?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
The three protections that must be extended over information can be described by the acronym ________.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Describe three limitations of SSID hiding.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
How have WLANs changed 'hard edges' into 'blurred edges'?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following are difficulties faced in defending attacks? (Choose all that apply.)
A) universally connected devices
B) operating system vendor's lack of concern about security
C) increased speed of attacks
D) attacks that are more complex
A) universally connected devices
B) operating system vendor's lack of concern about security
C) increased speed of attacks
D) attacks that are more complex
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ ensures that no unauthorized person or software has altered the information.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)
A) efficient
B) self-synchronizing
C) mandatory
D) exclusive
A) efficient
B) self-synchronizing
C) mandatory
D) exclusive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
WEP protects _______________ by scrambling the wireless data as it is transmitted.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Describe open system authentication.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Wireless access control is intended to limit a user's admission to the _______.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
What three categories can the protections implemented in the original 802.11 standard be divided into? (Choose three.)
A) access control
B) MAC address filtering
C) wired equivalent privacy
D) authentication
A) access control
B) MAC address filtering
C) wired equivalent privacy
D) authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Describe war driving.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck