NAME: ________________________

Question Types


Start With


Question Limit

of 19 available terms

Upgrade to
remove ads

7 Written Questions

6 Multiple Choice Questions

  1. - based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES
  2. - used for router-to-router traffic, and home user to ISP traffic.
    - handle error detection.
    - allows IP addresses to be negotiated.
    - so used in dial up it will set-up the connection with ISP and negotiate an IP address.
    - replaced SLIP in many uses.
  3. transmission of frames to a subset of the machines on the broadcast network.
  4. - Similar to bridge in that it routes frames.
    - most commonly used to connect individual computers.
  5. - backwards compatible with 802.11b so same WAP can service 802.11g and 802.11b.
  6. - developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz

6 True/False Questions

  1. SSIDdata link layer protocol described by the 802.11 standard.
    - uses RC4 often reuses IV.
    - many installations use the same shared key for all users, so each user can read each others traffic.
    - vulnerable to a number of known attacks.

          

  2. Broadcasttransmission of frames to a subset of the machines on the broadcast network.

          

  3. Unicast- associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.

          

  4. WEPdata link layer protocol described by the 802.11 standard.
    - uses RC4 often reuses IV.
    - many installations use the same shared key for all users, so each user can read each others traffic.
    - vulnerable to a number of known attacks.

          

  5. Blue tooth- available in a range of mobile devices.
    - operates in both ad-hoc mode and infrastructure mode.
    - by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
    - only authenticates devices, not users.
    - vulnerable to buffer over flow.

          

  6. Blue bug attack (bluetooth)allows an anonymous message to be displayed on victims device.

          

Create Set