80% OF QUESTIONS.DOC Flashcards
Match core standards and descriptions: 802.11i
Requires encryption key protocols TKIP and AES
Key Caching, pre-authentication (Used for VoIP)
WPA2
Match core standards and descriptions: This can be cracked in approximately 5 minutes
WEP
Match core standards and descriptions: 802.11X
Uses a central authentication server - which provides key management.
Also called Enterprise Mode
Match core standards and descriptions: Part of this standard has been cracked
WPA
A TCP _____ segment is a request to open a connection.
SYN
A Windows host sends a TCP segment with source port number 1200 and destination port number 80. The sending host is a/an _____.
Webserver
What is the structure of a MAC address?
3 byte OUI followed by a 3 byte vendor assigned number
Exploit programs that can be remotely controlled by an attacker are _____.
BOTS
Collecting and logging information about what employees do when they use a system is _____.
Auditing
A wireless host sends a packet to a server on the companys wired Ethernet LAN via an access point. How many frames will be involved in this oneway transmission?
2
In wireless LANs the protocol must be reliable because radio transmission is itself inherently unreliable. The steps taken in wireless LAN transmission are as follows: Sender listens for traffic 1. If there is traffic, the sender waits 2. If there is no traffic: 2a. If there has been no traffic for less than a preset amount of time, waits a random amount of time, then returns to Step 1. 2b, If there has been no traffic for more than a preset amount of time, sends without waiting 3. Receiver immediately sends back an acknowledgement 4. If sender does not receive the acknowledgement, it retransmits What is this protocol called? Choose the correct answer from the following list.
CSMA/CA+ACK
Programs that masquerade as system files are called?
Trojan Horses
When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually _____.
Passes the packet without notifying the administrator
Requiring someone to prove his or her identity is _____.
?
The total length of an IP address is ____ bits.
32
PSK prevents the use of weak keys
FALSE
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall _____.
Drops the packet
The process of proving a users identity is called
Authentication
Programs that hackers use to break into computers are_____.
Exploits
Consider the client computer message (put onto the network) of: “My 48-bit ethernet address is A3-4E-C0-1D-BE-EF. Please give me a 32-bit address.” What is the protocol in use?
DHCP
DHCP sends a PC a or an _____.
IP Address and Subnet Mask
The main benefit of IPv6 over IPv4 is _____.
The ability to support more possible hosts
How many host addresses are available for the network 10.5.4.0 255.255.255.0?
256
128.171.17.13:1234 is _____.
A socket