7 Written Questions
6 Multiple Choice Questions
- - chatty.
- no dedicated path required.
- - backwards compatible with 802.11b so same WAP can service 802.11g and 802.11b.
- - operates in different frequency range - 5 GHZ.
- less prone to interference.
- greater speeds.
- not as widely used.
- - available in a range of mobile devices.
- operates in both ad-hoc mode and infrastructure mode.
- by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
- only authenticates devices, not users.
- vulnerable to buffer over flow.
- allows an anonymous message to be displayed on victims device.
- - Similar to bridge in that it routes frames.
- most commonly used to connect individual computers.
6 True/False Questions
Multicast → transmission of frames to a subset of the machines on the broadcast network.
WEP → data link layer does not understand IP addresses.
ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
- defined in RFC 826.
- vulnerable to ARP poisening ( adding bogus entries to ARP cache).
Blue bug attack (bluetooth) → Attacker can use AT commands on victims cell to initiate calls, send messages etc.
ARP → data link layer protocol described by the 802.11 standard.
- uses RC4 often reuses IV.
- many installations use the same shared key for all users, so each user can read each others traffic.
- vulnerable to a number of known attacks.
Broadcast → - associated with point-to-point networks.
- point to point transmission with one sender and one receiver.
bridges → connects two or more LANs.
When a frame arrives, software in the bridge extracts the frame header and looks it up in a table to see where to send the frame.
- different line cards for different technologies, Ethernet, FDDI etc.
- each line has its own collision domain.