In: Computer Science
Quiz
Question 1 (1 point)
What characteristic of WLAN makes it vulnerable to a different set of attacks from wired LANs?
Question 1 options:
WLAN often is connected to a wired LAN |
|
It's difficult to effectively contain the radio signals. |
|
WLAN is very difficult to setup and manage |
|
None of above |
Question 2 (1 point)
Which of the following can be categorized an integrity attack to a WLAN?
Question 2 options:
War driving |
|
Denial of service |
|
802.11 Frame Injection |
|
Radio frequency jamming |
Question 3 (1 point)
Which of following is (are) vulnerability (ies) of Bluetooth technology?
Question 3 options:
Encryption key length is negotiable |
|
No user authentication exists |
|
End-to-end security isn't performed |
|
All of above |
Question 4 (1 point)
Which of following is (are) the problem(s) of WEP?
Question 4 options:
Use 40 or 104 bits keys that are static and common to all users |
|
The encryption algorithm RC4 used in WEP is flawed |
|
The IV is 24bits which is too short |
|
All of above |
Question 5 (1 point)
In Bluetooth ________, the authentication and encryption are completely bypassed.
Question 5 options:
security mode 1 |
|
security mode 2 |
|
security mode 3 |
|
security mode 4 |
Question 6 (1 point)
VLAN creates LAN workgroups that are independent of physical locations.
Question 6 options:
True |
|
False |
Question 7 (1 point)
Which of the following is(are) common goal(s) of wireless security policy?
Question 7 options:
Identify required security practices and measures |
|
Dictate acceptable behavior and enforcement |
|
Serving as a vehicel for achieving consensus |
|
All of above |
Question 8 (1 point)
Which of the following is the most effective way to protect your wireless network
Question 8 options:
SSID cloaking |
|
MAC filitering |
|
Reducing the AP power level |
|
Using WPA2 security standard |
Question 9 (1 point)
____________ outlines the security concepts that are important to the company for managers and technical custodians.
Question 9 options:
Governing policy |
|
End-user policy |
|
Technical policy |
|
None of above |
Question 10 (1 point)
Which of following statement about VPN is FALSE?
Question 10 options:
It extends a private network across a public network. |
|
It can authenticate user |
|
It protects the data being transmitted using encryption |
|
VPN is very easy to deploy and manage |
Answering the first four :-
Question 1:
a. True, WLAN usually are connected to wired or fiber cables. But physical access would be required in this case, just as it is in the case of wired lan. So, not different from set of attacks from wired.
b. True, modern wireless tech in use enables hackers to easily monitor data and in the worst case, they can harm the integrity of data (This is the correct option)
c. False, WLAN is easy to set up and manage.
d. False, b. is correct.
Question 2:
a. False. Wardriving is the act of searching for a wifi network while driving a vehicle. It is not an integrity attack as it does not change the contents.
b. False. Denial of Service means to hamper the availability of network to an authorised user. It does not involve change in contents, so not an integrity attack.
c. True, Injecting frames implies modifying data. So, it is an integrity attack. (Answer).
d. False, Frequency jamming hampers availablity, so not an integrity attack.
Question 3:
a. True, the length is negotiable and after both parties agree , can be fixed during the pairing stage.
b. True, in Mode 1 of bluetooth, there's no authentication. Mode2 limits the authentication to application software. Mode 3 is the built-in security offered by bluetooth. It requires a PIN.
c. True, only individual links are encrypted and authenticated. Data is decypted during intermediate stages.
d. Hence True. (answer)
Question 4:
a. True, these are shared and are common to all users. Hence, a compromised device may compromise all devices.
b. True, If the attacker knows IV of every packet, he can exploit it because the shortcomings of RC4 and a short and static IV gurantees that the streams will repeat.
c. True, The IV is just 24 bit which is small. This ensures that they streams will repeat frequently.
d. True, Refer a. , b. c. (answer)
Please give a thumbs up rating if you liked the answer. Feel free to ask anything in comments.