NAME

Question types


Start with


Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. - developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz
  2. data link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).
  3. Attacker can use AT commands on victims cell to initiate calls, send messages etc.
  4. - Similar to bridge in that it routes frames.
    - most commonly used to connect individual computers.
  5. transform raw transmission facility into a line that appears free of undetected errors to the network layer.
    Accomplishes this by having the sender break up the input into frames, and transmit them sequentially. If the service is reliable, the receiver confirms the correct receipt of each frame.
  6. - associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.

6 True/False questions

  1. WPA2- based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES

          

  2. 802.11a- developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz

          

  3. Blue jacking (bluetooth)allows an anonymous message to be displayed on victims device.

          

  4. Blue tooth- associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.

          

  5. SSIDdata link layer protocol described by the 802.11 standard.
    - uses RC4 often reuses IV.
    - many installations use the same shared key for all users, so each user can read each others traffic.
    - vulnerable to a number of known attacks.

          

  6. WEPdata link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).

          

Create Set