Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computer Security-12

Chapter 12

QuestionAnswer
The reliability that information has not been altered in transit is referred to as__________ Integrity
The ____________________ is a term used to describe the network transition from a provider's network to the Internet. WAP GAP
An 802.11 access point transmits__________ by default to announce the AP's availability Beacon frames
WAP uses the ____________________ protocol to attempt to ensure confidentialityof data. Wireless Transport Layer Security (WTLS)
The 32-character identifier attached to the header of a packet used for authentication to an 802.11 access point is the_______ Service Set Identifier (SSID)
The main weakness of WEP is its 24‐bit ____________________. Initialization vector
__________ is a new standard for strong ethernet authentication. 802.1X
____________________ is an unlicensed band that is used for wireless local area networks. 2.4GHz band
_____________ is the protocol used to send data to small handheld devices like cellular phones Wireless Application Protocol (WAP)
The default encryption protocol used by 802.11 is called ____________________. Wired Equivalent Privacy (WEP).
WTLS insurers integrity through what device? Message Authentication Codes (MAC)
Why is 802.11 wireless more of a security problem than any other type of network? It provides access to the physical layer of Ethernet without needing physical access to the building.
How do WAP endpoints choose which security parameters of WTLS to use for a session? The WTLS handshake determines what parameters to use.
What instant messaging client currently supports encryption? Trillian, a third‐party client, connects to all the major networks andcurrently supports encryption on the AIM and ICQ networks.
What protocol is WTLS trying to secure? Wireless Application Protocol (WAP)
While the SSID provides some measure of authentication, why is it not very effective? It is broadcast in every beacon frame.
The 802.1X protocol is a new protocol for ethernet___________. Authentication
WTLS must have support for short key lengths, limiting the amount of security the protocol can provide. What is the cause? WAP is designed to be used with small mobile devices, usually with low processor power and limited RAM, so it must support lower‐grade encryption.
Why are instant messaging protocols dangerous for file transfer? They bypass server based virus protections.
How do some instant messaging programs cause problems for intrusion detection systems? They can scan for open ports, trying to find a server.
Why should wireless have strong two-way authentication? Because wireless is especially susceptible to a man-in-the-middle attack.
The popularity of looking for and attacking wireless networks has increased greatly in the last few years. What has caused this? Attacking wireless networks is extremely popular because it’s easy—the majority of wireless networks have no security installed on them. This allowsanyone to simply connect and have practically full access to the network.
What two key lengths do most implementations of WEP support? 104 and 40
WEP has used an implementation of which of the following encryption algorithms? WEP uses the RC4 stream cipher.
One of the best ways to control access to a wireless network is_________? Site surveys
Created by: ryanparnelltcc1
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards