IS3120 CHAPTER 6 Flashcards

1
Q

A server that provides authentication, authorization, and accounting for a network

A

AAA server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system that uses a public key to encode data and a private key to decrypt data

A

Asymmetric encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A WLAN network that includes an access point

A

Basic Service Set (BSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The number of nodes and the amount of shared bandwidth available to each node and coverage

A

Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A modulation scheme defined in the IEEE 802.11b standard

A

Complementary code keying (CCK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The attempt to provide the same level of signal strength to all network nodes.

A

Coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application used to verify that the sender of a document, image, or message is a trusted source.

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A modulation technique included in the IEEE 802.11x standard

A

Direct sequence spread spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adapts the nominal bit rate of a wireless node to better use a communication channel.

A

Dynamic rate shifting (DRS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A WLAN that links together two BSS networks with a common linking device.

A

Extended Service Set (ESS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An authentication method that is used in WLAMs and point-to-point connections

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A peer-to-peer WLAN designation for each node in an ad hoc mode network.

A

Independent Basic Service Set (IBSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The 2.4 GHz bandwidth allocated to unlicensed use and used for 802.b/g/n

A

Industrial, scientific, and medical (ISM) bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cisco Systems’ version of EAP. It supports dynamic key encryption and mutual authentication

A

Lightweight Extensible Authentication Protocol (LEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prevents an attacker from intercepting, modifying, and retransmitting message packets by checking the integrity of a packet using the ICV.

A

Message integrity check (MIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The propagation that results in RF signals reaching the receiving antenna at different times and by two or more different paths.

A

Multipath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An antenna technology that uses multiple antennas (to receive and transmit) at both ends of a transmission.

A

Multiple-input and multiple-output (MIMO)

18
Q

A process through which a node gains access to a wireless network running WEP and access rules that are not encrypted

A

Open System Authentication (OSA)

19
Q

A frequency-division multiplexing (FDM) scheme that applies a digital multi-carrier modulation method

A

Orthogonal frequency division multiplexing (OFDM)

20
Q

A technique that can modulated both analog and digital transmissions

A

Quadrature amplitude modulation(QAM)

21
Q

A process through which a node gains access to a WLAN running the WEP protocol

A

Shared Key Authentication (SKA)

22
Q

A system of encryption that applies the same exact key to encrypt and decrypt data

A

Symmetric encryption system

23
Q

A security protocol used in the IEEE 802.11x wireless standard.

A

Temporal Key Integrity Protocol (TKIP)

24
Q

The 5 GHz frequency band used by IEEE 802.11a devices

A

Unlicensed National Information Infrastructure (UNII)

25
Q

A standard developed by the WiFi Alliance to certify protocols, software, and equipment standards

A

Wireless fidelity (WiFI)

26
Q
  1. The network security standard for all IEEE networks is ___.
  2. IEEE 802.11a
  3. IEEE 802.11i
  4. IEEE 802.1x
  5. IEEE 802.3
A

IEEE 802.1x

27
Q
  1. What did WPA add to improve on the WEP protocol?
  2. EAP
  3. EAPOL
  4. RC4
  5. TKIP
A

TKIP

28
Q
  1. Which of the following security threats has the primary objective of overloading a network’s resources, resulting in the resources becoming unavailable to the network’s users?
  2. Denial of service
  3. Intrusion
  4. Interception
  5. ARP spoofing
A

Denial of service

29
Q
  1. ___ is used to provide access to a network to users and networking devices.
  2. Authorization
  3. Accounting services
  4. Authentication
  5. Certification
A

Authentication

30
Q
  1. A DoS attack is NOT a common security threat to a network.
    TRUE OR FALSE
A

FALSE

31
Q
  1. What type of protocol does the 802.1x standard prescribe for authentication?
  2. TKIP
  3. EAP
  4. AAA
  5. DRS
A

EAP

32
Q
  1. The interference picked up by an RF antenna from other nearby transmitters is ___.
  2. EMI
  3. Metal box
  4. Crosstalk
  5. RFI
A

RFI

33
Q
  1. The capability of a WLAN to support a certain number of wireless nodes is called its ___.
  2. Capacity
  3. Coverage
  4. Mode
  5. Site survey
A

Capacity

34
Q
  1. What is the designation of a node in an ad hoc WLAN?
  2. ESS
  3. BSS
  4. IBSS
  5. SSID
A

IBSS

35
Q
  1. What is the process used to verify the capability of a site or a space to support a WLAN called?
  2. Coverage
  3. Capacity
  4. Site survey
  5. Mode
A

Site survey

36
Q
  1. What is the topology of a WLAN that includes only a single access point?
  2. BSS
  3. ESS
  4. IDSS
  5. RSSI
A

BSS

37
Q
  1. What is the purpose of a site survey?
  2. To perform acceptance testing on a new WLAN installation
  3. To ensure that a WLAN design provides sufficient signal strength and bandwidth for all planned stationary or mobile nodes
  4. To ensure that each node on a WLAN is functioning properly
  5. To verify an existing WLAN meets the requirements for connecting to a wireless WAN
A

To ensure that a WLAN design provides sufficient signal strength and bandwidth for all planned stationary or mobile nodes

38
Q
  1. The distance between a WLAN node and the AP to which it is associated determines the throughput the node experiences.
    TRUE OR FALSE
A

TRUE

39
Q
  1. What characteristic of the bandwidth of a WLAN is affected by the number of nodes associated with a particular access point?
  2. Bandwidth
  3. Login
  4. Security level
  5. Priority
A

Bandwidth

40
Q
  1. Which of the following does not create a serious barrier to the transmission of RF signals?
  2. Concrete
  3. Leaded glass
  4. Open space
  5. Water
A

Open space