Page 266 - StudyBook.pdf
P. 266
250 Chapter 4 • Communication Security: Wireless
8. The 802.1x standard requires the use of an authentication server to allow
access to the wireless LAN.You are deploying a wireless network and will use
EAP-TLS as your authentication method.What is the most likely vulnerability
in your network?
A. Unauthorized users accessing the network by spoofing EAP-TLS messages
B. DoS attacks occurring because 802.11 management frames are not
authenticated
C. Attackers cracking the encrypted traffic
D. None of the above
9. Concerning wireless network security,WEP (Wired Equivalent Privacy) was
originally designed to do which of the following?
A. Provide wireless collision detection and collision avoidance access methods
B. Provide the same level of security as a LAN (Local Area Network)
C. Provide the ability to allow RF signals to penetrate through walls
D. Provide greater accessibility than a wired LAN
10. Which of the following is the most common method used by attackers to
detect and identify the presence of an 802.11 wireless network?
A. Packet phishing
B. War dialing
C. Packet sniffing
D. War driving
11. Your company uses WEP (Wired Equivalent Privacy) for its wireless security.
Who may authenticate to the company’s access point?
A. Anyone in the company can authenticate
B. Only the administrator can authenticate
C. Only users with the valid WEP key
D. None of the above
www.syngress.com