Chapter 7 Understanding Wireless Security – Flashcards
Unlock all answers in this set
Unlock answersquestion
Wireless networks are essentially the same as wired networks when it comes to the security threats each faces.
answer
False
question
A RTS frame is the first step of the two-way handshake before sending a data frame
answer
True
question
Wireless networks use the CSMA/CD media access method
answer
False
question
Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.
answer
False
question
SNMP requires the installation of an SNMP agent on the device you want to monitor
answer
True
question
Which layer does wireless communication rely heavily upon?
answer
MAC sublayer of the Data Link layer
question
Which of the following is performed by the MAC sublayer?
answer
joining the wireless network
question
Which of the following is NOT part of a wireless MAC frame?
answer
TTL
question
Which management frame type is sent by a station wanting to terminate the connection?
answer
Disassociation
question
Which type of frame advertises services or information on a wireless network?
answer
Beacon
question
Which type of control frame does a station send to let the AP know is can transmit buffered frames?
answer
PS-Poll
question
Which of the following is NOT a field in a control frame?
answer
Sequence control
question
Which of the following is true about the SSID?
answer
they can be Null
question
What is a WNIC's equivalent of a NIC's promiscuous mode?
answer
RF monitor mode
question
In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?
answer
session hijacking
question
Which of the following is true about wardriving?
answer
attackers use RF monitor mode
question
In which type of attack do attackers intercept the transmissions of two communicating nodes without the user's knowledge?
answer
man-in-the-middle
question
Which of the following is true about the association process?
answer
a station first listens for beacons
question
What function does a RADIUS server provide to a wireless network?
answer
authentication
question
What is considered to be one of the biggest weaknesses of WEP?
answer
24-bit initialization vector
question
Which of the following is true about MAC addresses in a wireless network?
answer
you can change a WNICs MAC address with software
question
Which of the following is NOT a suggested practice before using a newly configured wireless network?
answer
use the default encryption method
question
Which EAP protocol requires digital certificates to validate supplicants?
answer
EAP-TLS
question
Which of the following is true about IEEE 802.11i?
answer
it uses a symmetric block cipher for encryption
question
Which popular wireless sniffer is an IDS that is passive and undetectable in operation?
answer
Kismet