Security Module 9 Flashcards
How does the initialization vector in TKIP eliminate collisions?
Increases the length to 48 bits
What is common in WEP encryption regardless if it is using 64-bit or 128-bit encryption?
uses a 24-bit IV
Why would an administrator disable SSID broadcasts on an access point?
In order to prevent advertisement of a network.
Why would a person upgrade their wireless network from an 802.11g to an 802.11n?
Increased data transfer rates
Which of the following is a security flaw in the WPS PIN method?
No lockout limit
Why would an attacker use the war driving technique?
Identify unprotected APs
How are piconets different from scatternets?
Scatternets contain a member in two or more piconets
APs often integrate which feature into a single hardware device?
DHCP
Which of the following is a security vulnerability associated with MAC address filtering?
Exchange between devices is unencrypted
Which of the following is a security vulnerability associated with MAC address filtering?
Exchange between devices is unencrypted
Why do attackers typically bluejack other devices?
To send advertisements
How does an evil twin differ from a rogue AP?
Rogue APs are set up by an internal user
WPAs MIC is a mathematical function that can potentially drop packets and can prevent which of the following from occuring?
Man-in-the-middle attacks
Why are RF jamming techniques rarely used?
Expense of the equipment
What is the maximum transmission power level of IEEE WLANs?
200 mW