NAME

Question types


Start with


Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. transform raw transmission facility into a line that appears free of undetected errors to the network layer.
    Accomplishes this by having the sender break up the input into frames, and transmit them sequentially. If the service is reliable, the receiver confirms the correct receipt of each frame.
  2. - chatty.
    - no dedicated path required.
  3. data link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).
  4. Attacker can use AT commands on victims cell to initiate calls, send messages etc.
  5. - needs to establish an end to end path before transmission.
    - analogue networks.
    - ISDN
    - PPP
  6. - based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES

6 True/False questions

  1. 802.11a- operates in different frequency range - 5 GHZ.
    - less prone to interference.
    - greater speeds.
    - not as widely used.

          

  2. Blue tooth- available in a range of mobile devices.
    - operates in both ad-hoc mode and infrastructure mode.
    - by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
    - only authenticates devices, not users.
    - vulnerable to buffer over flow.

          

  3. WEPdata link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).

          

  4. 802.11b- operates in different frequency range - 5 GHZ.
    - less prone to interference.
    - greater speeds.
    - not as widely used.

          

  5. Blue jacking (bluetooth)allows an anonymous message to be displayed on victims device.

          

  6. Point to point protocol (PPP)allows an anonymous message to be displayed on victims device.