Question types

Start with

Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. transmission of frames to all machines on the broadcast network.
  2. - associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.
  3. transform raw transmission facility into a line that appears free of undetected errors to the network layer.
    Accomplishes this by having the sender break up the input into frames, and transmit them sequentially. If the service is reliable, the receiver confirms the correct receipt of each frame.
  4. - based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES
  5. - operates in different frequency range - 5 GHZ.
    - less prone to interference.
    - greater speeds.
    - not as widely used.
  6. allows an anonymous message to be displayed on victims device.

6 True/False questions

  1. ARPdata link layer protocol described by the 802.11 standard.
    - uses RC4 often reuses IV.
    - many installations use the same shared key for all users, so each user can read each others traffic.
    - vulnerable to a number of known attacks.


  2. 802.11b- developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz


  3. Multicasttransmission of frames to a subset of the machines on the broadcast network.


  4. Packet-switching- needs to establish an end to end path before transmission.
    - analogue networks.
    - ISDN
    - PPP


  5. Point to point protocol (PPP)- used for router-to-router traffic, and home user to ISP traffic.
    - handle error detection.
    - allows IP addresses to be negotiated.
    - so used in dial up it will set-up the connection with ISP and negotiate an IP address.
    - replaced SLIP in many uses.


  6. Blue bug attack (bluetooth)Attacker can use AT commands on victims cell to initiate calls, send messages etc.