Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

7 Cards in this Set

  • Front
  • Back
Which are the issues affecting wireless security management?
End-user network configurations.
Peer-to-peer connections.
Non standard AP implementations
Pervasive weireless networks.
Match eash description with its attack type.
Attacker pretends to be an authorized user to gain network access. (A)
Examples include dictionary and birthday attacks. (B)
THe availability of network services is denied to legitimate users. (C)
Attacker alters the content of a transmission. (D)
Commonly uses a sniffer (E)
An attacker misuses information that was collected during a passive attack. (F)
The monitoring of network traffic patterns over a period of time. (G)
(B) Brute Force
(C) DoS
(D) Message modification
(E) Eavesdropping
(F) Replay
(G) Traffic analysis
Select the issues related to the security of an enterprise network.
War driving
Rogue APs
Use of sniffers
Weak authentication methods
Which of these represent business risk associated with data transmisison on WLANS?
Deployment of rogue APs by employees.
Loss of confidential information with the theft of laptops.
Attack on internet services and web sites via the corporate WLAN.
Unuathorized listening to WALN data transmissions by rivals.
Security os important in a wireless network to combat which threats?
Virus attacks
Insecure RF interfaces
Weaker user authentication controls
Large user base
Weak gateway security
Select the protection techniques that help protect a WLAN from intruders.
Encryption using a key management system
Use of OTP
Activation of standard 802.11 encryption
Assigning SSID to APs
Limiting the AP powr outputs.
Match each benefit of deploying a WLAN with its description.
Flexibility (A)
Ease of Installation (B)
Interoperability (C)
Cost effectiveness (D)
(A) Provides uninterrupted data access for mobile users.
(B) Allows ad-hoc mode configuration
(C) Ensures multiple-vendor appliance compatability,
(D) Provides low maintenance cost.