• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back

An IPv4 Class A address uses ____ bits for the network portion of the address and ____ bits for the host portion.

8.24

IPv6 addresses are ____ bits.

128

Which of the following is true about asymmetric cryptography?

the public key is used to encrypt a message sent to the private key owner

What is considered to be one of the biggest weaknesses of WEP?
24-bit initialization vector

Which wireless networking standard uses the 2.4 GHz band and has a maximum bandwidth of 54 MBps?

802.11g
What is a Basic Service Set?

a group of wireless devices served by a single AP

Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?

a message digest of mikes message is calculated using a hashing algorithm

Which of the following best describes a CRL?
a published listing of invalid certificates
Which of the following is true about the association process?

a station first listens for beacons

Which of the following is defined as the maximum departure of a wave from the undisturbed state?

amplitude

Which of the following types of traffic does NOT travel through routers?
ARP requests
Which of the following is NOT among the items of information that a CVE reference reports?
attack signature
Which of the following is true about wardriving?
attackers use RF monitor mod
What function does a RADIUS server provide to a wireless network?
authenication
Which type of frame advertises services or information on a wireless network?
BEACON
Which of the following tasks does an AP typically perform?

bridges between the wired and wireless networ

What is a potential problem with having too many APs in a given area?

co-channel interference

____ refers to preventing intentional or unintentional disclosure of communications between a sender and recipient.

Confieentiality

A ____ is anyone who attempts to gain access to unauthorized resources on a network, usually by finding a way to circumvent passwords, firewalls, or other protective measures.

cracker
The ____ in an IP packet is the part that end users see.
data
Which term is the measurement of the difference between two signals?
deciper

Which of the following is a type of cryptanalysis that applies primarily to block ciphers but can also be used against stream ciphers and hashing functions and works by examining how differences in input affect the output?

differential

____ are electronic documents containing an encrypted series of numerals and characters called a digital signature.

Digital certificates

Which management frame type is sent by a station wanting to terminate the connection?

Disassociation

What uses mathematical calculations to compare routes based on some measurement of distance?

distance-vector routing protocols

What does a measurement of +3 dB equal in power measured in mW?
double the power
Which RF transmission method uses an expanded redundant chipping code to transmit each bit?
DSSS

Which EAP protocol requires digital certificates to validate supplicants?

Eap-TLS

Which of the following best describes a one-way function?

easy to compute but difficult and time consuming to reverse

Which wireless transmission method uses a hopping code?

FHSS

Which of the following is true about RF transmissions?
frequency has an inverse relationship with wavelength
Which of the following is defined as the positive difference in amplitude between two signals?
gain
Which of the following is commonly used for verifying message integrity?
hashing function
Which of the following is true about Message Authentication Code
he key is sent to the receiver securely
Which component of IPsec enables computers to exchange keys to make an SA?
IKE
____ ensures the accuracy and consistency of information during all processing (storage, transmission, and so forth).
Integrity
What term is given to a device that is designed to generate radio signals, not including those from the antenna?
intentional radiator
Which of the following is true about IEEE 802.11i?
it uses a symmetric block cipher for encryption
Which of the following is performed by the MAC sublayer?
joining the wireless by the MAC sublayer
Which popular wireless sniffer is an IDS that is passive and undetectable in operation?
kismet
A ____ is a type of script that automates repetitive tasks in Microsoft Word or similar applications.
macro
Which of the following makes a single pass on data and generates a 128-bit hash value displayed as a 32-character hexadecimal number and is used in VPNs?
messAGE Digest 5
What is used to convert an analog RF signal into digital format?
modulator
Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not drop back to zero before the end of the bit period?
NRZ

A ____ is primarily interested in blocking Web site activities through a distributed denial of service (DDoS) attack.

packet monkey

The term ____ refers to measures taken to physically protect a computer or other network device from theft, fire, or environmental disaster.

Physical Security

Which of the following is true about cryptographic primitives?

primitives are usually not the source of security failures

Which type of control frame does a station send to let the AP know is can transmit buffered frames?

ps-poll
What is a downside to using Triple DES?

requires more processing time

Which of the following makes routing tables more efficient
route summarization
Which TCP flag can be the default response to a probe on a closed port?
rst
____ are executable code attached to e-mail messages or downloaded files that infiltrates a system.
Scripts

What Cisco router command encrypts all passwords on the router?

service password-encryption

In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?

session hijacking

The ____ tells another computer which part of the IP address is the network address and which part is the host address.

subnet mask

Under which attack category does a UNIX Sendmail exploitation fall?

suspicious data payload

Which of the following is true about infrared transmissions?

the intensity of the light pulse indicates the on or off status of each bit

What is the most likely weak link when using asymmetric encryption for verifying message integrity and nonrepudiation?
the source of the public keys
Which of the following is true about encryption algorithms?
their strength is tied to their key length

Which of the following is true about ACL s on CIsco routers.

there is an implicit deny any statement at the end of the ACL

Which of the following is true about PRNGs?

they are not completely random
Which of the following is true about the SSID?
they can be null
How does the CVE standard make network security devices and tools more effective?
they can share information about attack signatures
An IPv4 Class A address uses ____ bits for the network portion of the address and ____ bits for the host portion.
247.76
IPv6 addresses are ____ bits.
367.52
Which of the following is true about asymmetric cryptography?
the public key is used to encrypt a message sent to the private key owner
What is considered to be one of the biggest weaknesses of WEP?
24-bit initialization vector
Which wireless networking standard uses the 2.4 GHz band and has a maximum bandwidth of 54 MBps?
802.11g
What is a Basic Service Set?
a group of wireless devices served by a single AP
Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?

a message digest of mikes message is calculated using a hashing algorithm