Netw360 W6 Ilab

334 Words2 Pages
1.) Each of the following is a reason why it is difficult to defend against today's attackers except: Complexity of attack tools. 2.) _______ensures that only authorized parties can view the information. Availability 3.) Each of the following is a layer that protects security except: Communication 4.) Which of the following is true regarding a rogue AP? It is an unauthorized AP installed by an employee 5.) Which of the following is false regarding a man-in-the-middle attack? It requires a rogue AP. 6.) Which of the following is not a wireless DoS attack? Creating false deauthentication or disassociation frames 7.) Which of the following is not a wireless LAN attack faced by a home user? Upload harmful content 8.) Each of the following can be used in war driving except: Wired NIC 9.) What is access control in a WLAN? Restricting direct access to a Web server 10.) Each of the following is a name for the Media Access Control (MAC) address except: Logical address 11.) WEP stands for_______. Wired equivalent privacy 12.) What is data called that is to be encrypted by inputting into an encryption algorithm? Plaintext 13.) A mathematical value used to produce ciphertext is called a(n)_______. Key 14.) What is a weak key? A key that creates a repeating pattern 15.) What is the minimum length for a WEP key? 64 bits 16.) The_______is a 24-bit value used in WEP that changes each time a packet is encrypted. IV 17.) Which of authentication is a match of SSIDs? Shared key authentication 18.) Each of the following is a limitation of SSID hiding except: The SSID can be discovered in other management frames sent by the AP. 19.) Which of the following is not a limitation to MAC address filtering? Not all client devices have MAC addresses.

More about Netw360 W6 Ilab

Open Document