Page 265 - StudyBook.pdf
P. 265

Communication Security: Wireless • Chapter 4  249

                      A. Spoofing

                      B. Jamming
                      C. Sniffing
                      D. Man in the middle


                  5. The biggest weakness in WEP stems from which vulnerability?
                      A. The reuse of IV values.
                      B. The ability to crack WEP by statistically determining the WEP key
                         through the Fluhrer-Mantin-Shamir attack.
                      C. The ability to spoof MAC addresses thereby bypassing MAC address fil-
                         ters.
                      D. All of the above.


                  6. The tool NetStumbler detects wireless networks based on what feature?
                      A. SSID
                      B. WEP key

                      C. MAC address
                      D. CRC-32 checksum

                  7. Some DoS attacks are unintentional.Your wireless network at home has been
                      having sporadic problems.The wireless network is particularly susceptible in
                      the afternoon and the evenings.This is most likely due to which of the fol-
                      lowing possible problems?
                      A. The AP is flaky and needs to be replaced.
                      B. Someone is flooding your AP with traffic in a DoS attack.

                      C. The wireless network is misconfigured.
                      D. Your cordless phone is using the same frequency as the wireless network
                         and whenever someone calls or receives a call the phone jams the wireless
                         network.












                                                                              www.syngress.com
   260   261   262   263   264   265   266   267   268   269   270