Information Technology /Cyber-Security: Chapter 11
Cyber-Security: Chapter 11
This deck covers key concepts from Chapter 11 on Cyber-Security, focusing on wireless networks, IEEE standards, encryption protocols, and network security measures.
Lan and Wan
802
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/30
Key Terms
Term
Definition
Lan and Wan
802
It is possible to have a wireless network that does not connect to a wired network.
True
Which IEEE standard can achieve a throughput of 54 Mbps?
802.11g
What TKIP enhancement addressed the WEP vulnerability of forging packets?
Message Integrity Check (MIC)
In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?
supplicant
Which of the following channels is available in 802.11b for attempting to prevent overlapping? (Choose all that apply.)
1 6 11
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Lan and Wan | 802 |
It is possible to have a wireless network that does not connect to a wired network. | True |
Which IEEE standard can achieve a throughput of 54 Mbps? | 802.11g |
What TKIP enhancement addressed the WEP vulnerability of forging packets? | Message Integrity Check (MIC) |
In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN? | supplicant |
Which of the following channels is available in 802.11b for attempting to prevent overlapping? (Choose all that apply.) | 1 6 11 |
What is the 1 to 32 character configurable name used to identify a WLAN? | SSID |
Which of the following defines how data is placed on a carrier signal? | Modulation |
Which of the following is a utility that is a wireless network detector, sniffer, and an intrusion detection system? | Vistumbler |
An access point provides which of the following? | Access to the DS |
Disabling SSID broadcasts must be configured on the computer and the AP. True or False? | False |
Which of the following EAP methods uses TLS to authenticate the server to the client, but not the client to the server? | PEAP |
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer? | Data Link layer |
Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges? | channels |
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected. | True |
Which wireless encryption standard offers the best security? | WPA2 |
Bluetooth technology is more vulnerable to network attacks than WLANs are. True or False? | False |
What protocol was added to 802.11i to address WEP’s encryption vulnerability? | TKIP |
Which of the following typically functions as the 802.1x authenticator, allowing or denying a supplicant’s access to a WLAN? | AP |
What protocol improves WPA encryption by adding Message Integrity Checks, Extended Initialization Vectors, Per-packet key mixing, and a Re-keying mechanism to improve encryption? | TKIP |
Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely? | WPS |
What standard specifically defines the process of authenticating and authorizing users on a network? | 802.1X |
Which IEEE standard defines authentication and authorization in wireless networks? | 802.1X |
What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band? | FHSS |
Wardriving requires expensive hardware and software. True or False? | False |
Which of the following is a transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN with a wired network? | access point (AP) |
There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility. | True |
Which tool that can help reduce the risk of a wardriver attacking your WLAN? | airbase-ng |
The IEEE 802.11 standard pertains to which layers and sublayers of the OSI model? (Choose all that apply.) | MAC sublayer of the Data Link Layer | Physical layer |
Kismet is known as which of the following? | passive scanner |