Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
Which are the issues affecting wireless security management?
|
End-user network configurations.
Peer-to-peer connections. Non standard AP implementations Pervasive weireless networks. |
|
Match eash description with its attack type.
Attacker pretends to be an authorized user to gain network access. (A) Examples include dictionary and birthday attacks. (B) THe availability of network services is denied to legitimate users. (C) Attacker alters the content of a transmission. (D) Commonly uses a sniffer (E) An attacker misuses information that was collected during a passive attack. (F) The monitoring of network traffic patterns over a period of time. (G) |
(A) MITM
(B) Brute Force (C) DoS (D) Message modification (E) Eavesdropping (F) Replay (G) Traffic analysis |
|
Select the issues related to the security of an enterprise network.
|
War driving
Rogue APs Use of sniffers Weak authentication methods |
|
Which of these represent business risk associated with data transmisison on WLANS?
|
Deployment of rogue APs by employees.
Loss of confidential information with the theft of laptops. Attack on internet services and web sites via the corporate WLAN. Unuathorized listening to WALN data transmissions by rivals. |
|
Security os important in a wireless network to combat which threats?
|
Virus attacks
Insecure RF interfaces Weaker user authentication controls Large user base Weak gateway security |
|
Select the protection techniques that help protect a WLAN from intruders.
|
Encryption using a key management system
Use of OTP Activation of standard 802.11 encryption Assigning SSID to APs Limiting the AP powr outputs. |
|
Match each benefit of deploying a WLAN with its description.
Flexibility (A) Ease of Installation (B) Interoperability (C) Cost effectiveness (D) |
(A) Provides uninterrupted data access for mobile users.
(B) Allows ad-hoc mode configuration (C) Ensures multiple-vendor appliance compatability, (D) Provides low maintenance cost. |