Ch 11 quiz Flashcards

1
Q

Which one of the following is not deprecated in the 802.11 standard?

CCMP

TKIP

WEP

Shared Key Authentication

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is MAC filtering not secure?

The encryption used is not strong enough

The password is sent as clear text

Attackers can easily identify allowed MAC addresses

It doesn’t work after the AP has been running for three or more hours

A

Attackers can easily identify allowed MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What term is defined as an association between two stations that includes the 4-way handshake?

RSNA

Pre-RSNA

WEP

WIDS

A

RSNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common security recommendation when using WPA2-Personal?

Use a passphrase of at least 40 characters

Only implement it through WPS

Reset the passphrase periodically

None of these

A

Reset the passphrase periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What phrase is used to describe when the client and server are both authenticated?

Mutual authentication

Bi-direction authentication

Full duplex authentication

Total authentication

A

Mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What role does AP or controller play in an 802.1X implementation?

Supplicant

Authentication Server

Access Server

Authenticator

A

Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol is used between WLAN clients and APs or controllers when EAP is implemented?

GRE

CAPWAP

LDAP

EAPOL

A

EAPOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which virtual port is used to access LAN resources like files and printers in an 802.11X port-based authentication implementation?

Uncontrolled

Controlled

Auth_Port

No-Auth_Port

A

Controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do EAP methods used with WLANs need to provide?

Dynamic key generation

Anomaly detection

Hashing

Repudiation

A

Dynamic key generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which one of the following frame types is not protected by management frame protection?

De-authentication

Disassociation

Probe Requests

Robust Action

A

Probe Requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly