Filters
Question type

Study Flashcards

Pre-authentication allows for faster roaming between access points.

Correct Answer

verifed

verified

How do TKIP and MIC perform encryption in the WPA personal security model?

Correct Answer

verifed

verified

The steps are as follows:
* Step 1-Inste...

View Answer

WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.

Correct Answer

verifed

verified

False

The original PSK passphrase is mathematically manipulated (known as ____________________) 4,096 times before it is transmitted.

Correct Answer

verifed

verified

In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.


A) per-packet
B) temporal
C) CRC
D) TKIP

Correct Answer

verifed

verified

PSK passphrases of fewer than 20 characters can be subject to ____ attacks.


A) DDoS
B) QoS
C) offline dictionary
D) DoS

Correct Answer

verifed

verified

IEEE 802.11i includes ____, which stores information from a device on the network so if a user roams away from an AP and later returns,he does not need to re-enter all of the credentials.


A) pre-authentication
B) port security
C) MIC
D) key-caching

Correct Answer

verifed

verified

WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.

Correct Answer

verifed

verified

preshared ...

View Answer

WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.


A) per-packet keys
B) Message Integrity Check (MIC)
C) TKIP check
D) TKIP keys

Correct Answer

verifed

verified

WPA replaces WEP with an encryption technology called ____________________.

Correct Answer

verifed

verified

Temporal Key Integri...

View Answer

____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.


A) AES
B) RC4
C) Block cipher
D) Port security

Correct Answer

verifed

verified

The most robust level of security that can be achieved today for wireless LANs is using the ____ model.


A) personal security
B) transitional security
C) temporal security
D) enterprise security

Correct Answer

verifed

verified

PSK keys are automatically changed (called ____) .


A) MIC
B) key mixing
C) IV sequence
D) rekeying

Correct Answer

verifed

verified

IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.


A) 802.1a
B) 802.1g
C) 802.1x
D) 802.1z

Correct Answer

verifed

verified

The block cipher used in 802.11i is the ____________________.

Correct Answer

verifed

verified

Advanced Encryption Standard (AES) Advanced Encryption Standard AES

What are some of the PSK key management weaknesses?

Correct Answer

verifed

verified

PSK key management weaknesses include th...

View Answer

Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.


A) block cipher
B) chain cipher
C) text cipher
D) CRC cipher

Correct Answer

verifed

verified

What are the benefits of limiting the maximum number of DHCP users?

Correct Answer

verifed

verified

The maximum number of DHCP users (someti...

View Answer

The ____ model is designed for single users or small office/home office (SOHO) settings of generally 10 or fewer wireless devices.


A) enterprise security
B) personal security
C) transitional security
D) temporal security

Correct Answer

verifed

verified

B

It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES.

Correct Answer

verifed

verified

Showing 1 - 20 of 42

Related Exams

Show Answer