NAME

Question types


Start with


Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. - operates in different frequency range - 5 GHZ.
    - less prone to interference.
    - greater speeds.
    - not as widely used.
  2. allows an anonymous message to be displayed on victims device.
  3. - used for router-to-router traffic, and home user to ISP traffic.
    - handle error detection.
    - allows IP addresses to be negotiated.
    - so used in dial up it will set-up the connection with ISP and negotiate an IP address.
    - replaced SLIP in many uses.
  4. - associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.
  5. - straight out of the box, no security configured at all.
    - WAPs are usually configured to broadcast their presence.
    - each wireless network node and access point needs the same SSID.
    - could choose not to broadcast SSID.
    - Also could implement MAC filtering.
  6. - chatty.
    - no dedicated path required.

6 True/False questions

  1. Main task of the data link layer- used for router-to-router traffic, and home user to ISP traffic.
    - handle error detection.
    - allows IP addresses to be negotiated.
    - so used in dial up it will set-up the connection with ISP and negotiate an IP address.
    - replaced SLIP in many uses.

          

  2. WPA2- based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES

          

  3. 802.11b- developed before 802.11a.
    - data throughput of up to 11Mbps.
    - most widely used standard; as a result the frequency is crowded; might run into interference from other wireless devices.
    - networks secured through use of WPA and WEP.
    - 2.4 ghz

          

  4. Multicasttransmission of frames to a subset of the machines on the broadcast network.

          

  5. Blue bug attack (bluetooth)Attacker can use AT commands on victims cell to initiate calls, send messages etc.

          

  6. Blue tooth- available in a range of mobile devices.
    - operates in both ad-hoc mode and infrastructure mode.
    - by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
    - only authenticates devices, not users.
    - vulnerable to buffer over flow.