Page 266 - StudyBook.pdf
P. 266

250    Chapter 4 • Communication Security: Wireless

               8. The 802.1x standard requires the use of an authentication server to allow
                  access to the wireless LAN.You are deploying a wireless network and will use
                  EAP-TLS as your authentication method.What is the most likely vulnerability
                  in your network?
                  A. Unauthorized users accessing the network by spoofing EAP-TLS messages

                  B. DoS attacks occurring because 802.11 management frames are not
                      authenticated

                  C. Attackers cracking the encrypted traffic
                  D. None of the above

               9. Concerning wireless network security,WEP (Wired Equivalent Privacy) was
                  originally designed to do which of the following?
                  A. Provide wireless collision detection and collision avoidance access methods

                  B. Provide the same level of security as a LAN (Local Area Network)
                  C. Provide the ability to allow RF signals to penetrate through walls
                  D. Provide greater accessibility than a wired LAN


              10. Which of the following is the most common method used by attackers to
                  detect and identify the presence of an 802.11 wireless network?

                  A. Packet phishing
                  B. War dialing
                  C. Packet sniffing

                  D. War driving

              11. Your company uses WEP (Wired Equivalent Privacy) for its wireless security.
                  Who may authenticate to the company’s access point?
                  A. Anyone in the company can authenticate
                  B. Only the administrator can authenticate

                  C. Only users with the valid WEP key
                  D. None of the above










          www.syngress.com
   261   262   263   264   265   266   267   268   269   270   271