click below
click below
Normal Size Small Size show me how
Computer Security-12
Chapter 12
| Question | Answer |
|---|---|
| The reliability that information has not been altered in transit is referred to as__________ | Integrity |
| The ____________________ is a term used to describe the network transition from a provider's network to the Internet. | WAP GAP |
| An 802.11 access point transmits__________ by default to announce the AP's availability | Beacon frames |
| WAP uses the ____________________ protocol to attempt to ensure confidentialityof data. | Wireless Transport Layer Security (WTLS) |
| The 32-character identifier attached to the header of a packet used for authentication to an 802.11 access point is the_______ | Service Set Identifier (SSID) |
| The main weakness of WEP is its 24‐bit ____________________. | Initialization vector |
| __________ is a new standard for strong ethernet authentication. | 802.1X |
| ____________________ is an unlicensed band that is used for wireless local area networks. | 2.4GHz band |
| _____________ is the protocol used to send data to small handheld devices like cellular phones | Wireless Application Protocol (WAP) |
| The default encryption protocol used by 802.11 is called ____________________. | Wired Equivalent Privacy (WEP). |
| WTLS insurers integrity through what device? | Message Authentication Codes (MAC) |
| Why is 802.11 wireless more of a security problem than any other type of network? | It provides access to the physical layer of Ethernet without needing physical access to the building. |
| How do WAP endpoints choose which security parameters of WTLS to use for a session? | The WTLS handshake determines what parameters to use. |
| What instant messaging client currently supports encryption? | Trillian, a third‐party client, connects to all the major networks andcurrently supports encryption on the AIM and ICQ networks. |
| What protocol is WTLS trying to secure? | Wireless Application Protocol (WAP) |
| While the SSID provides some measure of authentication, why is it not very effective? | It is broadcast in every beacon frame. |
| The 802.1X protocol is a new protocol for ethernet___________. | Authentication |
| WTLS must have support for short key lengths, limiting the amount of security the protocol can provide. What is the cause? | WAP is designed to be used with small mobile devices, usually with low processor power and limited RAM, so it must support lower‐grade encryption. |
| Why are instant messaging protocols dangerous for file transfer? | They bypass server based virus protections. |
| How do some instant messaging programs cause problems for intrusion detection systems? | They can scan for open ports, trying to find a server. |
| Why should wireless have strong two-way authentication? | Because wireless is especially susceptible to a man-in-the-middle attack. |
| The popularity of looking for and attacking wireless networks has increased greatly in the last few years. What has caused this? | Attacking wireless networks is extremely popular because it’s easy—the majority of wireless networks have no security installed on them. This allowsanyone to simply connect and have practically full access to the network. |
| What two key lengths do most implementations of WEP support? | 104 and 40 |
| WEP has used an implementation of which of the following encryption algorithms? | WEP uses the RC4 stream cipher. |
| One of the best ways to control access to a wireless network is_________? | Site surveys |