Chapter 11 Flashcards
Lan and Wan
802
It is possible to have a wireless network that does not connect to a wired network.
True
Which IEEE standard can achieve a throughput of 54 Mbps?
802.11g
What TKIP enhancement addressed the WEP vulnerability of forging packets?
Message Integrity Check (MIC)
In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?
supplicant
Which of the following channels is available in 802.11b for attempting to prevent overlapping? (Choose all that apply.)
1 6 11
What is the 1 to 32 character configurable name used to identify a WLAN?
SSID
Which of the following defines how data is placed on a carrier signal?
Modulation
Which of the following is a utility that is a wireless network detector, sniffer, and an intrusion detection system?
Vistumbler
An access point provides which of the following?
Access to the DS
Disabling SSID broadcasts must be configured on the computer and the AP. True or False?
False
Which of the following EAP methods uses TLS to authenticate the server to the client, but not the client to the server?
PEAP
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?
Data Link layer
Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges?
channels
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
True
Which wireless encryption standard offers the best security?
WPA2
Bluetooth technology is more vulnerable to network attacks than WLANs are. True or False?
False
What protocol was added to 802.11i to address WEP’s encryption vulnerability?
TKIP
Which of the following typically functions as the 802.1x authenticator, allowing or denying a supplicant’s access to a WLAN?
AP
What protocol improves WPA encryption by adding Message Integrity Checks, Extended Initialization Vectors, Per-packet key mixing, and a Re-keying mechanism to improve encryption?
TKIP
Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?
WPS
What standard specifically defines the process of authenticating and authorizing users on a network?
802.1X
Which IEEE standard defines authentication and authorization in wireless networks?
802.1X
What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?
FHSS
Wardriving requires expensive hardware and software. True or False?
False
Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network?
access point (AP)
There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
True
Which tool that can help reduce the risk of a wardriver attacking your WLAN?
airbase-ng
The IEEE 802.11 standard pertains to which layers and sublayers of the OSI model? (Choose all that apply.)
MAC sublayer of the Data Link Layer
Physical layer
Kismet is known as which of the following?
passive scanner