Filters
Question type

Study Flashcards

In a MITM attack, access to the local network is not required in order to work.

A) True
B) False

Correct Answer

verifed

verified

The ultimate goal of a DoS attack is to ________.


A) cause harm
B) frustrate users
C) practice hacking
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

EAP uses RADIUS for authentication.

A) True
B) False

Correct Answer

verifed

verified

An attacker controlling bots in a coordinated attack against a victim is known as a ________.


A) DoS attack
B) DDoS attack
C) ICMP
D) None of the above.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The Wi-Fi Alliance calls 802.11i ________.


A) WPA
B) WPA2
C) WEP
D) None of the above

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

________ is used by ________ for authentication.


A) EAP, RADUS
B) RADIUS, EAP
C) Both A and B
D) Neither A nor B

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Ensuring network ________ means that authorized users have access to information, services, and network resources.


A) confidentiality
B) integrity
C) availability
D) authentication

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Rogue access points are unauthorized access points set up by individuals or departments.

A) True
B) False

Correct Answer

verifed

verified

A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.


A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What mistake did the 802.11i Working Group make when creating IVs?


A) Transmitting IVs in the clear
B) Making the IV too short
C) Both A and B
D) Neither A nor B

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In normal ARP traffic, every host can make ARP requests.

A) True
B) False

Correct Answer

verifed

verified

True

The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.

A) True
B) False

Correct Answer

verifed

verified

False

A ________ attack is when a webserver is flooded with application layer web requests.


A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In 802.11i, EAP outer authentication takes place before inner authentication.

A) True
B) False

Correct Answer

verifed

verified

Firms still choose to use WPA in order to ________.


A) avoid configuration expenses for access points
B) avoid configuration expenses for wireless clients
C) Both A and B
D) Neither A nor B

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification.

A) True
B) False

Correct Answer

verifed

verified

An EAP response message may contain ________.


A) a request for a different authentication mechanism
B) a negative acknowledgement
C) Both A and B
D) Neither A nor B

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

B

The 802.11 standards were developed by the IEEE 802.11 Working Group.

A) True
B) False

Correct Answer

verifed

verified

Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs.


A) wired, wireless
B) wireless, wired
C) about an equal concern for wired and wireless LANs
D) None of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying.


A) 802.11i
B) WPA
C) WEP
D) None of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 119

Related Exams

Show Answer