Security Module 9 Flashcards
How does the initialization vector in TKIP eliminate collisions?
Increases the length to 48 bits
What is common in WEP encryption regardless if it is using 64-bit or 128-bit encryption?
uses a 24-bit IV
Why would an administrator disable SSID broadcasts on an access point?
In order to prevent advertisement of a network.
Why would a person upgrade their wireless network from an 802.11g to an 802.11n?
Increased data transfer rates
Which of the following is a security flaw in the WPS PIN method?
No lockout limit
Why would an attacker use the war driving technique?
Identify unprotected APs
How are piconets different from scatternets?
Scatternets contain a member in two or more piconets
APs often integrate which feature into a single hardware device?
DHCP
Which of the following is a security vulnerability associated with MAC address filtering?
Exchange between devices is unencrypted
Which of the following is a security vulnerability associated with MAC address filtering?
Exchange between devices is unencrypted
Why do attackers typically bluejack other devices?
To send advertisements
How does an evil twin differ from a rogue AP?
Rogue APs are set up by an internal user
WPAs MIC is a mathematical function that can potentially drop packets and can prevent which of the following from occuring?
Man-in-the-middle attacks
Why are RF jamming techniques rarely used?
Expense of the equipment
What is the maximum transmission power level of IEEE WLANs?
200 mW
Which of the following is true when a NIC is in master mode?
The NIC is acting as an AP
A MAC address consists of two parts, a ________ and a 24-bit IAB
24-bit OUI
Which of the following is a preferable method to secure wireless acess in a SOHO?
WPA2 Personal
Which of the following devices can NOT cause wireless interference?
Wired IP phone