Chap_4 Quiz Flashcards
A ________ is an older attack that uses an illegally large IP packet to crash an operating system.
ping of death
A network administrator notices extensive damage to wireless packets. This might indicate a ________ attack.
DoS flood attack
An EAP message begins with an ________ message.
EAP start
Attackers can exploit WEPs weaknesses by ________.
Both using WEP cracking software and reading two messages encrypted with the same key
CTS frames tell other wireless clients that you want to transmit for a given amount of time.
False
EAP uses RADIUS for authentication.
False
Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network.
functionality
Firms still choose to use WPA in order to ________.
Both avoid configuration expenses for access points and avoid configuration expenses for wireless clients
n 802.11i pre-shared key mode, the initial key is generated ________.
from a passphrase
In 802.1X, the heavy authentication work is done on ________.
Neither authenticators nor clients
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host… true or false?
false
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts… true or false?
false
In pre-shared key mode, a passphrase should be at least ________ characters long?
20
Listing your friend’s home in the local classifieds at a low price is equivalent to a ________.
P2P redirect
Most central authentication servers are governed by the ________ standard.
RADIUS
Open networks can be legally accessed by anyone and are frequently posted as such…. true or false?
false
RC4 uses WEP for fast and therefore cheap encryption….. true or false?
false
RTS frames tell other wireless clients that you want to transmit for a given amount of time…..true or false?
true
To use an access point, you must know its SSID…..true or false?
true
Using a shared initial key is dangerous in ________.
WEP
WEP encrypts each frame with a per-frame key that consists of the shared RC4 key plus a 24-bit initialization vector that is different for each frame….true or false?
true
What mistake did the 802.11i Working Group make when creating IVs?
making the IV too short (wep)
In 802.11i pre-shared key mode, the initial key is generated
from a passphrase
Each media access control (MAC) address has a network interface card (NIC). (T or F)
false
EAP uses RADIUS for authentication…T or F?
false
In 802.1X, the heavy authentication work is done on ________.?
neither authenticators or clients
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts T or F?
False
In normal ARP traffic, generally an attacker on the same network cannot see traffic between two hosts.
true
Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address T or F?
true
To use an access point, you must know its SSID?
True
Using a shared initial key is dangerous in ?
WEP