Answers.
In the TJX breach, attackers first got into the network through ________.
A) spear phishing
B) an inside conspirator
C) the use of weak wireless encryption
D) all of the above - Answer The use of weak wireless encryption.
Wireless LAN standards come from ________.
A) OSI
B) TCP/IP
C) both A and B
D) neither A nor B - Answer OSI
To drive around a city looking for working access points that are unprotected is ________.
A) drive-by hacking
B) war driving - Answer War Driving
Breaking into WLANs from outside the premises is ________.
A) drive-by hacking
B) war driving - Answer Drive-by hacking
802.11i provides ________.
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B - Answer Both A and B
,In 802.11i, protection is provided between the client and the ________.
A) access point
B) switch
C) router
D) server - Answer Access point
Which 802 working group created 802.11i?
A) 802.1
B) 802.3
C) 802.11
D) It was not an 802 working group. It was the Wi-Fi Alliance - Answer 802.11
Which offers stronger security?
A) WPA
B) 802.11i
C) Both A and B offer equally strong security. - Answer Both are the same
What is the strongest security protocol for 802.11 today?
A) 802.11i
B) 802.11s
C) 802.11X
D) WPA - Answer 802.11i
In what mode of 802.11i operation is a central authentication server used?
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B - Answer 802.1X mode
,In 802.11i ________, hosts must know a shared initial key.
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B - Answer PSK mode
After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n)
________ key.
A) VPN
B) session
C) 802.1X
D) preshared - Answer Session
After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to
communicate with the access point.
A) the preshared key
B) an 802.1X key
C) WPS keys
D) different session keys - Answer Different session keys
For post-authentication communication with an access point, the client in 802.11i PSK mode will
________ for subsequent communication.
A) always use the same preshared key each time it is connected
B) always use the same session key each time it is connected
C) both A and B
D) neither A nor B - Answer Neither
Session keys are used to ________.
A) make cryptanalysis more difficult
, B) improve authentication
C) both A and B
D) neither A nor B - Answer Make cryptanalysis more difficult
Which of the following is a risk in 802.11i PSK mode?
A) WPS can easily be cracked if it is used.
B) Unauthorized sharing of the pre-shared key.
C) A weak passphrase may be selected.
D) all of the above - Answer All of the above
In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
A) 8
B) 12
C) 20
D) 128 - Answer 20
Part of WPS weakness is caused by ________.
A) 802.1X mode
B) WPA2 preshared key mode
C) dividing the 8 digit PIN into two 4 digit halves
D) IPsec - Answer Dividing the 8 digit PIN into two 4 digit halves
Which of the following has a dangerous vulnerability that is causing problems today?
A) PEAP
B) 802.11i
C) WPA
D) WPS - Answer WPS
If a firm has many access points, it should use ________ mode in 802.11i.