MIS 4850 Systems Security
Review Questions | Chapter 4.6 Wireless Security
Student Name: __________________________________________
Chapter 4: Wireless Security (p.220-240)
1) Drive-by hacking is found when a company uses _____.
A) Parking garages with poor automated access control
B) WLANs
C) Both of the above.
D) Neither a. nor b.
2) The main family of WLAN standards in business is _____.
A) 802.1
B) 802.3
C) 802.5
D) 802.11
E) Bluetooth
3) SSIDs provide reasonable security when they are turned on.
a) TRUE b) FALSE
4) All access points in a Wireless LAN must have the same SSID.
a) TRUE b) FALSE
5) Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs.
A) wired, wireless
B) wireless, wired
C) about an equal concern for wired and wireless LANs
D) None of the above
6. Wireless 802.11 networks generally have a range of ________.
A) 5 to 10 meters
B) 10 to 30 meters
C) 15 to 45 meters
D) None of the above
7. Which of the following is an example of a wireless attack?
A) unauthorized network access
B) man-in-the-middle attack using an evil twin
C) wireless DOS attacks
D) All of the above
8. The most common attack against a wireless network is a wireless DoS attack.
a) TRUE b) FALSE
9. The most common attack against a wireless network is a(n) ________.
A) man-in-the-middle attack using an evil twin
B) wireless DOS attacks
C) unauthorized network access
D) None of the above
10. Secure wireless networks can be legally accessed by anyone and are frequently posted as such.
a) TRUE b) FALSE
11. Open networks can be legally accessed by anyone and are frequently posted as such.
a) TRUE b) FALSE
12. Rogue access points are authorized access points set up by individuals or departments.
a) TRUE b) FALSE
13. Rogue access points are unauthorized access points set up by individuals or departments.
a) TRUE b) FALSE
14. By giving unauthorized users access to a local WLAN means that they are on the local network.
a) TRUE b) FALSE
15. After gaining wireless access to the private network, the attacker can ________.
A) cause harm to internal clients
B) steal data
C) launch external attacks
D) All of the above
16. In a man-in-the-middle attack, an evil twin sends its own attacks, impersonating the victim.
a) TRUE b) FALSE
17. In a man-in-the-middle attack, ________.
A) an evil twin must have a stronger signal than the legitimate AP
B) an evil twin sends its own attacks, impersonating the victim
C) Both A and B
D) Neither A nor B
18. Evil twin access point attacks are most common in ________.
A) secure WLANs
B) public hotspots
C) wired connected networks
D) None of the above
19. WLAN DoS attacks are designed to affect the ________ of the network.
A) confidentiality
B) integrity
C) availability
D) authentication
20. The original 802.11 core security protocol, ________, was deeply flawed.
A) 802.11i
B) WPA
C) WEP
D) None of the above. The original core protocol was NOT deeply flawed.
21. WEP stands for ________.
A) wireless equivalent privacy
B) wireless equivalent policy
C) wired equivalent privacy
D) wired equivalent policy
22. WEP typically takes ________ to crack today.
A) minutes
B) hours
C) days
D) weeks
23. WEP encrypts each frame with a per-frame key that consists of the shared RC4 key plus a 24-bit initialization vector that is different for each frame.
a) TRUE b) FALSE
24. What mistake did the 802.11i Working Group make when creating IVs?
A) transmitting IVs in the clear
B) making the IV too short
C) Both A and B
D) Neither A nor B
25. Attackers can exploit WEPs weaknesses by ________.
A) using WEP cracking software
B) reading two messages encrypted with the same key
C) Both A and B
D) Neither A nor B
26. In a large organization, WEP rekeying is inexpensive.
a) TRUE b) FALSE
27. Nearly all wireless access points can support 802.11i.
a) TRUE b) FALSE
28. The Wi-Fi Alliance calls 802.11i ________.
A) WPA
B) WPA2
C) WEP
D) None of the above
29. Pre-shared key mode was created for homes and small businesses with a single access point.
a) TRUE b) FALSE
30. 802.11i works in ________ mode.
A) pre-shared key
B) enterprise
C) Both A and B
D) Neither A nor B
31. An unauthorized access point set up by individuals or departments is called a(n) ________ access point.
A) rogue
B) evil twin
C) Both A and B
D) Neither A nor B
ReadingQuestionsCh4-6(WirelessSecurity).doc 3/4