Page 264 - StudyBook.pdf
P. 264
248 Chapter 4 • Communication Security: Wireless
A. Key Sharer and Key Requester
B. Applicants and Supplicants
C. Servers and Clients
D. Authenticators and Supplicants
E. All of the above
2. What can be implemented in a wireless network to provide authentication,
data and privacy protection?
A. WTLS
B. WEP
C. WAP
D. WSET
3. You are tasked with creating a new wireless network for corporate users.
However, your CEO is very concerned about security and the integrity of the
rest of the company’s network.You assure your CEO that the new wireless
network will be secure by suggesting you will place the wireless network APs
in a special area.Where will you place the wireless APs?
A. Your office
B. The CEO’s office
C. A DMZ
D. A secured server room
E. A fresnel zone
4. Your wireless network uses WEP to authorize users, but you also use MAC
filtering to ensure that only preauthorized clients can associate with your APs.
On Monday morning, you reviewed the AP association table logs for the pre-
vious weekend and noticed that the MAC address assigned to the network
adapter in your portable computer had associated with your APs several times
over the weekend.Your portable computer spent the weekend on your dining
room table and was not connected to your corporate wireless network during
this period of time.What type of wireless network attack are you most likely
being subjected to?
www.syngress.com