NAME

Question types


Start with


Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. allows an anonymous message to be displayed on victims device.
  2. data link layer protocol described by the 802.11 standard.
    - uses RC4 often reuses IV.
    - many installations use the same shared key for all users, so each user can read each others traffic.
    - vulnerable to a number of known attacks.
  3. - chatty.
    - no dedicated path required.
  4. - operates in different frequency range - 5 GHZ.
    - less prone to interference.
    - greater speeds.
    - not as widely used.
  5. - straight out of the box, no security configured at all.
    - WAPs are usually configured to broadcast their presence.
    - each wireless network node and access point needs the same SSID.
    - could choose not to broadcast SSID.
    - Also could implement MAC filtering.
  6. - needs to establish an end to end path before transmission.
    - analogue networks.
    - ISDN
    - PPP

6 True/False questions

  1. Broadcast- associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.

          

  2. ARPdata link layer protocol described by the 802.11 standard.
    - uses RC4 often reuses IV.
    - many installations use the same shared key for all users, so each user can read each others traffic.
    - vulnerable to a number of known attacks.

          

  3. Main task of the data link layertransform raw transmission facility into a line that appears free of undetected errors to the network layer.
    Accomplishes this by having the sender break up the input into frames, and transmit them sequentially. If the service is reliable, the receiver confirms the correct receipt of each frame.

          

  4. 802.11b- developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz

          

  5. Blue toothtransmission of frames to all machines on the broadcast network.

          

  6. switchesconnects two or more LANs.
    When a frame arrives, software in the bridge extracts the frame header and looks it up in a table to see where to send the frame.
    - different line cards for different technologies, Ethernet, FDDI etc.
    - each line has its own collision domain.

          

Create Set