Chap_4 Quiz Flashcards
A ________ is an older attack that uses an illegally large IP packet to crash an operating system.
ping of death
A network administrator notices extensive damage to wireless packets. This might indicate a ________ attack.
DoS flood attack
An EAP message begins with an ________ message.
EAP start
Attackers can exploit WEPs weaknesses by ________.
Both using WEP cracking software and reading two messages encrypted with the same key
CTS frames tell other wireless clients that you want to transmit for a given amount of time.
False
EAP uses RADIUS for authentication.
False
Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network.
functionality
Firms still choose to use WPA in order to ________.
Both avoid configuration expenses for access points and avoid configuration expenses for wireless clients
n 802.11i pre-shared key mode, the initial key is generated ________.
from a passphrase
In 802.1X, the heavy authentication work is done on ________.
Neither authenticators nor clients
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host… true or false?
false
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts… true or false?
false
In pre-shared key mode, a passphrase should be at least ________ characters long?
20
Listing your friend’s home in the local classifieds at a low price is equivalent to a ________.
P2P redirect
Most central authentication servers are governed by the ________ standard.
RADIUS