Chap_4 Quiz Flashcards

1
Q

A ________ is an older attack that uses an illegally large IP packet to crash an operating system.

A

ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator notices extensive damage to wireless packets. This might indicate a ________ attack.

A

DoS flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An EAP message begins with an ________ message.

A

EAP start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attackers can exploit WEPs weaknesses by ________.

A

Both using WEP cracking software and reading two messages encrypted with the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CTS frames tell other wireless clients that you want to transmit for a given amount of time.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP uses RADIUS for authentication.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network.

A

functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firms still choose to use WPA in order to ________.

A

Both avoid configuration expenses for access points and avoid configuration expenses for wireless clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

n 802.11i pre-shared key mode, the initial key is generated ________.

A

from a passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In 802.1X, the heavy authentication work is done on ________.

A

Neither authenticators nor clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host… true or false?

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts… true or false?

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In pre-shared key mode, a passphrase should be at least ________ characters long?

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Listing your friend’s home in the local classifieds at a low price is equivalent to a ________.

A

P2P redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most central authentication servers are governed by the ________ standard.

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Open networks can be legally accessed by anyone and are frequently posted as such…. true or false?

A

false

17
Q

RC4 uses WEP for fast and therefore cheap encryption….. true or false?

A

false

18
Q

RTS frames tell other wireless clients that you want to transmit for a given amount of time…..true or false?

A

true

19
Q

To use an access point, you must know its SSID…..true or false?

A

true

20
Q

Using a shared initial key is dangerous in ________.

A

WEP

21
Q

WEP encrypts each frame with a per-frame key that consists of the shared RC4 key plus a 24-bit initialization vector that is different for each frame….true or false?

A

true

22
Q

What mistake did the 802.11i Working Group make when creating IVs?

A

making the IV too short (wep)

23
Q

In 802.11i pre-shared key mode, the initial key is generated

A

from a passphrase

24
Q

Each media access control (MAC) address has a network interface card (NIC). (T or F)

A

false

25
Q

EAP uses RADIUS for authentication…T or F?

A

false

26
Q

In 802.1X, the heavy authentication work is done on ________.?

A

neither authenticators or clients

27
Q

In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts T or F?

A

False

28
Q

In normal ARP traffic, generally an attacker on the same network cannot see traffic between two hosts.

A

true

29
Q

Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address T or F?

A

true

30
Q

To use an access point, you must know its SSID?

A

True

31
Q

Using a shared initial key is dangerous in ?

A

WEP