7 Written questions
6 Multiple choice questions
- - chatty.
- no dedicated path required.
- - needs to establish an end to end path before transmission.
- analogue networks.
- - used for router-to-router traffic, and home user to ISP traffic.
- handle error detection.
- allows IP addresses to be negotiated.
- so used in dial up it will set-up the connection with ISP and negotiate an IP address.
- replaced SLIP in many uses.
- Attacker can use AT commands on victims cell to initiate calls, send messages etc.
- - based on EAP framework; negotiate authentication method at startup.
- 802.1X standard.
- uses AES
- transform raw transmission facility into a line that appears free of undetected errors to the network layer.
Accomplishes this by having the sender break up the input into frames, and transmit them sequentially. If the service is reliable, the receiver confirms the correct receipt of each frame.
6 True/False questions
802.11b → - developed before 802.11a.
- data throughput of up to 11Mbps.
- most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
- networks secured through use of WPA and WEP.
- 2.4 ghz
switches → - Similar to bridge in that it routes frames.
- most commonly used to connect individual computers.
802.11a → - operates in different frequency range - 5 GHZ.
- less prone to interference.
- greater speeds.
- not as widely used.
ARP → data link layer protocol described by the 802.11 standard.
- uses RC4 often reuses IV.
- many installations use the same shared key for all users, so each user can read each others traffic.
- vulnerable to a number of known attacks.
Blue jacking (bluetooth) → Attacker can use AT commands on victims cell to initiate calls, send messages etc.
Unicast → transmission of frames to a subset of the machines on the broadcast network.