Security Module 9 Flashcards

1
Q

How does the initialization vector in TKIP eliminate collisions?

A

Increases the length to 48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is common in WEP encryption regardless if it is using 64-bit or 128-bit encryption?

A

uses a 24-bit IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why would an administrator disable SSID broadcasts on an access point?

A

In order to prevent advertisement of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would a person upgrade their wireless network from an 802.11g to an 802.11n?

A

Increased data transfer rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a security flaw in the WPS PIN method?

A

No lockout limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why would an attacker use the war driving technique?

A

Identify unprotected APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are piconets different from scatternets?

A

Scatternets contain a member in two or more piconets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APs often integrate which feature into a single hardware device?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a security vulnerability associated with MAC address filtering?

A

Exchange between devices is unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a security vulnerability associated with MAC address filtering?

A

Exchange between devices is unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do attackers typically bluejack other devices?

A

To send advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does an evil twin differ from a rogue AP?

A

Rogue APs are set up by an internal user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPAs MIC is a mathematical function that can potentially drop packets and can prevent which of the following from occuring?

A

Man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are RF jamming techniques rarely used?

A

Expense of the equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the maximum transmission power level of IEEE WLANs?

A

200 mW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is true when a NIC is in master mode?

A

The NIC is acting as an AP

17
Q

A MAC address consists of two parts, a ________ and a 24-bit IAB

A

24-bit OUI

18
Q

Which of the following is a preferable method to secure wireless acess in a SOHO?

A

WPA2 Personal

19
Q

Which of the following devices can NOT cause wireless interference?

A

Wired IP phone