NAME

Question types


Start with


Question limit

of 19 available terms

Advertisement Upgrade to remove ads
Print test

7 Written questions

6 Multiple choice questions

  1. allows an anonymous message to be displayed on victims device.
  2. transform raw transmission facility into a line that appears free of undetected errors to the network layer.
    Accomplishes this by having the sender break up the input into frames, and transmit them sequentially. If the service is reliable, the receiver confirms the correct receipt of each frame.
  3. - needs to establish an end to end path before transmission.
    - analogue networks.
    - ISDN
    - PPP
  4. Attacker can use AT commands on victims cell to initiate calls, send messages etc.
  5. - backwards compatible with 802.11b so same WAP can service 802.11g and 802.11b.
  6. - based on EAP framework; negotiate authentication method at startup.
    - 802.1X standard.
    - uses AES

6 True/False questions

  1. Unicasttransmission of frames to a subset of the machines on the broadcast network.

          

  2. Blue tooth- available in a range of mobile devices.
    - operates in both ad-hoc mode and infrastructure mode.
    - by default security is disabled but does have three security modes, ranging from full data encryption to integrity control.
    - only authenticates devices, not users.
    - vulnerable to buffer over flow.

          

  3. ARPdata link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).

          

  4. Broadcast- associated with point-to-point networks.
    - point to point transmission with one sender and one receiver.

          

  5. WEPdata link layer does not understand IP addresses.
    ARP sends out request, who owns IP address? this is used to build table of MAC 48 bit addresses to IP addresses.
    - defined in RFC 826.
    - vulnerable to ARP poisening ( adding bogus entries to ARP cache).

          

  6. switchesconnects two or more LANs.
    When a frame arrives, software in the bridge extracts the frame header and looks it up in a table to see where to send the frame.
    - different line cards for different technologies, Ethernet, FDDI etc.
    - each line has its own collision domain.