Chapter 7 Understanding Wireless Security

question

Wireless networks are essentially the same as wired networks when it comes to the security threats each faces.
answer

False
question

A RTS frame is the first step of the two-way handshake before sending a data frame
answer

True
question

Wireless networks use the CSMA/CD media access method
answer

False
question

Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.
answer

False
question

SNMP requires the installation of an SNMP agent on the device you want to monitor
answer

True
question

Which layer does wireless communication rely heavily upon?
answer

MAC sublayer of the Data Link layer
question

Which of the following is performed by the MAC sublayer?
answer

joining the wireless network
question

Which of the following is NOT part of a wireless MAC frame?
answer

TTL
question

Which management frame type is sent by a station wanting to terminate the connection?
answer

Disassociation
question

Which type of frame advertises services or information on a wireless network?
answer

Beacon
question

Which type of control frame does a station send to let the AP know is can transmit buffered frames?
answer

PS-Poll
question

Which of the following is NOT a field in a control frame?
answer

Sequence control
question

Which of the following is true about the SSID?
answer

they can be Null
question

What is a WNIC’s equivalent of a NIC’s promiscuous mode?
answer

RF monitor mode
question

In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?
answer

session hijacking
question

Which of the following is true about wardriving?
answer

attackers use RF monitor mode
question

In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge?
answer

man-in-the-middle
question

Which of the following is true about the association process?
answer

a station first listens for beacons
question

What function does a RADIUS server provide to a wireless network?
answer

authentication
question

What is considered to be one of the biggest weaknesses of WEP?
answer

24-bit initialization vector
question

Which of the following is true about MAC addresses in a wireless network?
answer

you can change a WNICs MAC address with software
question

Which of the following is NOT a suggested practice before using a newly configured wireless network?
answer

use the default encryption method
question

Which EAP protocol requires digital certificates to validate supplicants?
answer

EAP-TLS
question

Which of the following is true about IEEE 802.11i?
answer

it uses a symmetric block cipher for encryption
question

Which popular wireless sniffer is an IDS that is passive and undetectable in operation?
answer

Kismet

Get instant access to
all materials

Become a Member