Podcast
Questions and Answers
What is the primary benefit of using a wired LAN in terms of data reception?
What is the primary benefit of using a wired LAN in terms of data reception?
- It provides a higher speed of data transmission
- It limits reception of data to stations connected to the LAN (correct)
- It allows for more devices to be connected
- It is more cost-effective
How are security levels assigned to subjects in a secure operating system?
How are security levels assigned to subjects in a secure operating system?
- Based on the user's role in the organization
- Based on the user's password/ID and terminal access (correct)
- Based on the type of data being accessed
- Based on the type of computer being used
What happens when the Trojan horse program attempts to store the sensitive character string in a public file?
What happens when the Trojan horse program attempts to store the sensitive character string in a public file?
- The attempt is denied due to the security policy (correct)
- The attempt is denied due to the access control list
- The program is terminated by the operating system
- The attempt is allowed by the reference monitor
What is the primary weakness of the WEP algorithm?
What is the primary weakness of the WEP algorithm?
What is the primary purpose of the 802.11i task group?
What is the primary purpose of the 802.11i task group?
What is the relationship between the security levels 'sensitive' and 'public'?
What is the relationship between the security levels 'sensitive' and 'public'?
What is the primary purpose of the authentication phase between the STA and AS?
What is the primary purpose of the authentication phase between the STA and AS?
What happens to non-authentication traffic between the STA and AS during the authentication phase?
What happens to non-authentication traffic between the STA and AS during the authentication phase?
Where does secure data transfer occur?
Where does secure data transfer occur?
What is the purpose of the connection termination phase?
What is the purpose of the connection termination phase?
What is the first exchange in the discovery phase?
What is the first exchange in the discovery phase?
What is the role of the AP in the authentication transaction?
What is the role of the AP in the authentication transaction?
What is the purpose of the Wi-Fi Alliance's WPA standard?
What is the purpose of the Wi-Fi Alliance's WPA standard?
What is the final form of the 802.11i standard referred to as?
What is the final form of the 802.11i standard referred to as?
What is the purpose of the authentication function in the 802.11i RSN security specification?
What is the purpose of the authentication function in the 802.11i RSN security specification?
What is the purpose of the access control function in the 802.11i RSN security specification?
What is the purpose of the access control function in the 802.11i RSN security specification?
What is the purpose of the privacy with message integrity function in the 802.11i RSN security specification?
What is the purpose of the privacy with message integrity function in the 802.11i RSN security specification?
What is the first phase of operation in an IEEE 802.11i RSN?
What is the first phase of operation in an IEEE 802.11i RSN?
What is the primary purpose of the key management phase in IEEE 802.11i?
What is the primary purpose of the key management phase in IEEE 802.11i?
What is the relationship between the master session key (MSK) and the pairwise master key (PMK)?
What is the relationship between the master session key (MSK) and the pairwise master key (PMK)?
What is the purpose of the pairwise transient key (PTK)?
What is the purpose of the pairwise transient key (PTK)?
What is the primary advantage of TKIP over older wireless LAN security approaches?
What is the primary advantage of TKIP over older wireless LAN security approaches?
What is the alternative to the master session key (MSK) in IEEE 802.11i?
What is the alternative to the master session key (MSK) in IEEE 802.11i?
What algorithm is used to generate the MIC in TKIP?
What algorithm is used to generate the MIC in TKIP?
What are the two schemes defined in IEEE 802.11i for protecting data transmitted in 802.11 MPDUs?
What are the two schemes defined in IEEE 802.11i for protecting data transmitted in 802.11 MPDUs?
What is the purpose of the authentication phase in IEEE 802.11i?
What is the purpose of the authentication phase in IEEE 802.11i?
What is the primary difference between TKIP and CCMP?
What is the primary difference between TKIP and CCMP?
What service does CCMP provide, in addition to message integrity?
What service does CCMP provide, in addition to message integrity?
Which of the following is not a method for securing a WLAN?
Which of the following is not a method for securing a WLAN?
Flashcards are hidden until you start studying