Deck 12: Wireless

ملء الشاشة (f)
exit full mode
سؤال
What is wireless networking?

A)The transmission of packetized data by means of fiber optic cable
B)The transmission of packetized data via the internet
C)The transmission of packetized data by means of physical topology not using direct physical links
D)The transmission of packetized data by means of private bands
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
______________ is the process by which each end of the data flow proves that they are who they say they are.

A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
سؤال
With any wireless protocol,which of the following are true?

A)Extra care should be taken to ensure that the security of the protocol is not compromised.
B)A WAP gateway should be created.
C)Encryption standards should be random.
D)RSA encryption should be used.
سؤال
When an attacker uses Bluetooth to copy e-mails,contact lists,or other files on the device,it is called

A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
سؤال
______________ means reliable information.

A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
سؤال
A new standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is

A)WAP
B)WTLS
C)802.11b
D)804.11b
سؤال
Security issues associated with WTLS include which of the following?

A)The specifications do not allow connections without high security.
B)WTLS cannot cope with small amounts of memory.
C)WTLS cannot cope with limited processor capacity.
D)Clients with low memory or CPU capabilities cannot support encryption.
سؤال
The cryptographic standard for proposed for 3G networks is

A)EVDO
B)MISTY1
C)HSPA
D)KASUMI
سؤال
______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set.

A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
سؤال
Which of the following protocols was designed for short-range wireless communication typically with mobile phones?

A)WPA2
B)Bluetooth
C)WEP
D)802.11n
سؤال
_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet.

A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
سؤال
Which of the following specifications of 802.11 has the highest speed?

A)g
B)n
C)i
D)s
سؤال
What is WAP?

A)It is a protocol used by laptop computers for wireless communication.
B)It is used primarily to encrypt wired communications,but can be used for wireless as well.
C)It is another name for 802.11g.
D)It is a protocol used by cellular phones to deliver e-mail and lightweight web services.
سؤال
WAP was designed to work on which of the following?

A)Devices with low computing power
B)Devices with high computing power
C)Devices with long range
D)Devices with short range
سؤال
_________ is sending an unauthorized message to another Bluetooth device.

A)Bluejacking
B)Bluesnarfing
C)Bluehacking
D)Bluephreaking
سؤال
WAP uses _______________ for its encryption scheme.

A)WEP
B)SSL
C)WTLS
D)ElGamal
سؤال
Why is wireless problematic from a security standpoint?

A)There is no control over physical limitations.
B)Insufficient signal strength
C)There is no control over the physical layer of traffic.
D)There is no control over the network.
سؤال
The security concern over the so-called WAP gap is when

A)WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway.
B)WAP gateways have a significant lag and hold the messages long enough for them to be decrypted by attackers.
C)WAP protocol is susceptible to Gateway Acquisition Pilfering (gap).
D)The encryption fails to translate from one encryption scheme to another.
سؤال
WAP implements integrity through the use of

A)DES
B)3DES
C)MACs
D)DACs
سؤال
802.11 is the IEEE standard for wireless local area networks and includes the following:

A)a,b,c,g
B)n,g,c
C)a,b,g,n
D)b,g,n
سؤال
A(n)_______________ is a 802.11 management frame for the network and contains several different fields such as the time stamp and beacon interval.
سؤال
In _______________,the attacker uses a Bluetooth to establish a serial connection to the device.
سؤال
Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails,contact lists,calendars,photos,and videos.
سؤال
The most common frequency band used in the household is 4.2 GHz.
سؤال
In _______________,instead of sending an unsolicited message to the victim's phone,the attacker copies off the victim's information,which can include e-mails or contact lists.
سؤال
_______________ started with people using chalk on sidewalks to mark some of the wireless networks they found.
سؤال
_______________ is a modulation type that spreads the traffic sent over the entire bandwidth.
سؤال
_______________ encrypts the plaintext data and then sends it over the airwaves as a cipher text.
سؤال
WEP was not designed with confidentiality in mind.
سؤال
_______________ multiplexes or separates the data to be transmitted into smaller chunks and then transmits the chunks on several sub channels.
سؤال
Because the security of wireless LANs is ineffective,many users have switched to a layered security approach.
سؤال
802.1x is not is not compatible with RADIUS or LDAP.
سؤال
Access to actual Ethernet segments is not protected by physical security measures.
سؤال
WEP provides strong protection for confidentiality.
سؤال
NetStumbler is a program that is used to sniff wireless traffic and break WEP keys.
سؤال
_______________ protocol can support a wide variety of authentication methods and also fits well into existing authentication systems like RADIUS.
سؤال
Alert messages in Wireless Transport Layer Security (WTLS)are sometimes sent in plaintext and are not authenticated.
سؤال
If unauthorized wireless is set up,it is known as a(n)_______________.
سؤال
_______________ is a term used for the act of sending an unauthorized message to another Bluetooth device.
سؤال
Physical access to a machine will enable an attacker to bypass any security measure that has been placed on that machine.
سؤال
What is WAP and what are its security implications?
سؤال
Discuss 802.11 security issues and possible solutions.
سؤال
Describe the different wireless systems in use today.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/43
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Wireless
1
What is wireless networking?

A)The transmission of packetized data by means of fiber optic cable
B)The transmission of packetized data via the internet
C)The transmission of packetized data by means of physical topology not using direct physical links
D)The transmission of packetized data by means of private bands
C
2
______________ is the process by which each end of the data flow proves that they are who they say they are.

A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
C
3
With any wireless protocol,which of the following are true?

A)Extra care should be taken to ensure that the security of the protocol is not compromised.
B)A WAP gateway should be created.
C)Encryption standards should be random.
D)RSA encryption should be used.
A
4
When an attacker uses Bluetooth to copy e-mails,contact lists,or other files on the device,it is called

A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
5
______________ means reliable information.

A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
6
A new standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is

A)WAP
B)WTLS
C)802.11b
D)804.11b
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
7
Security issues associated with WTLS include which of the following?

A)The specifications do not allow connections without high security.
B)WTLS cannot cope with small amounts of memory.
C)WTLS cannot cope with limited processor capacity.
D)Clients with low memory or CPU capabilities cannot support encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
8
The cryptographic standard for proposed for 3G networks is

A)EVDO
B)MISTY1
C)HSPA
D)KASUMI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
9
______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set.

A)Bluejacking
B)Bluesnarfing
C)Bluebugging
D)Bluehacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following protocols was designed for short-range wireless communication typically with mobile phones?

A)WPA2
B)Bluetooth
C)WEP
D)802.11n
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
11
_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet.

A)Integrity
B)Confidentiality
C)Authentication
D)WTLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following specifications of 802.11 has the highest speed?

A)g
B)n
C)i
D)s
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is WAP?

A)It is a protocol used by laptop computers for wireless communication.
B)It is used primarily to encrypt wired communications,but can be used for wireless as well.
C)It is another name for 802.11g.
D)It is a protocol used by cellular phones to deliver e-mail and lightweight web services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
14
WAP was designed to work on which of the following?

A)Devices with low computing power
B)Devices with high computing power
C)Devices with long range
D)Devices with short range
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
15
_________ is sending an unauthorized message to another Bluetooth device.

A)Bluejacking
B)Bluesnarfing
C)Bluehacking
D)Bluephreaking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
16
WAP uses _______________ for its encryption scheme.

A)WEP
B)SSL
C)WTLS
D)ElGamal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
17
Why is wireless problematic from a security standpoint?

A)There is no control over physical limitations.
B)Insufficient signal strength
C)There is no control over the physical layer of traffic.
D)There is no control over the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
18
The security concern over the so-called WAP gap is when

A)WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway.
B)WAP gateways have a significant lag and hold the messages long enough for them to be decrypted by attackers.
C)WAP protocol is susceptible to Gateway Acquisition Pilfering (gap).
D)The encryption fails to translate from one encryption scheme to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
19
WAP implements integrity through the use of

A)DES
B)3DES
C)MACs
D)DACs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
20
802.11 is the IEEE standard for wireless local area networks and includes the following:

A)a,b,c,g
B)n,g,c
C)a,b,g,n
D)b,g,n
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)_______________ is a 802.11 management frame for the network and contains several different fields such as the time stamp and beacon interval.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
22
In _______________,the attacker uses a Bluetooth to establish a serial connection to the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
23
Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails,contact lists,calendars,photos,and videos.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
24
The most common frequency band used in the household is 4.2 GHz.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
25
In _______________,instead of sending an unsolicited message to the victim's phone,the attacker copies off the victim's information,which can include e-mails or contact lists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
26
_______________ started with people using chalk on sidewalks to mark some of the wireless networks they found.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
27
_______________ is a modulation type that spreads the traffic sent over the entire bandwidth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
28
_______________ encrypts the plaintext data and then sends it over the airwaves as a cipher text.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
29
WEP was not designed with confidentiality in mind.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
30
_______________ multiplexes or separates the data to be transmitted into smaller chunks and then transmits the chunks on several sub channels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
31
Because the security of wireless LANs is ineffective,many users have switched to a layered security approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
32
802.1x is not is not compatible with RADIUS or LDAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
33
Access to actual Ethernet segments is not protected by physical security measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
34
WEP provides strong protection for confidentiality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
35
NetStumbler is a program that is used to sniff wireless traffic and break WEP keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
36
_______________ protocol can support a wide variety of authentication methods and also fits well into existing authentication systems like RADIUS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
37
Alert messages in Wireless Transport Layer Security (WTLS)are sometimes sent in plaintext and are not authenticated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
38
If unauthorized wireless is set up,it is known as a(n)_______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
39
_______________ is a term used for the act of sending an unauthorized message to another Bluetooth device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
40
Physical access to a machine will enable an attacker to bypass any security measure that has been placed on that machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is WAP and what are its security implications?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss 802.11 security issues and possible solutions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe the different wireless systems in use today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.