Name:     ID: 
 
Email: 

CWNA Chapter 8 & 9

True/False
Indicate whether the statement is true or false.
 

 1. 

Information security involves more than protecting the information itself.
 

 2. 

WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
 

 3. 

Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
 

 4. 

Wireless DoS attacks are exactly the same as wired DoS attacks.
 

 5. 

Cryptography is a new invention of the 20th Century.
 

 6. 

Employees pose only a small threat to networks.
 

 7. 

WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
 

 8. 

A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
 

 9. 

The block cipher used in 802.11i is the Data Encryption Standard (DES).
 

 10. 

Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.
a.
Computer Emergency Response Team Coordination Center (CERT/CC)
b.
SysAdmin, Audit, Network, Security (SANS) Institute
c.
InfraGard
d.
National Security Institute (NSI)
 

 12. 

MAC address filtering ____.
a.
is difficult to implement
c.
requires pre-approved authentication
b.
is expensive
d.
does not work well
 

 13. 

A ____ is not malicious but often seeks to expose security flaws.
a.
script kiddie
c.
cracker
b.
spy
d.
hacker
 

 14. 

What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?
a.
key caching
c.
pre-authentication
b.
port security
d.
message passing
 

 15. 

____ is another name for open systems authentication.
a.
WEP
c.
Symmetric key encryption
b.
SSID filtering
d.
Public key encryption
 

 16. 

____ was designed to address WEP vulnerabilities with a minimum of inconvenience.
a.
IEEE 802.11i
c.
dynamic WEP
b.
WPA
d.
TGi
 

 17. 

The ____ method of encryption is used in a personal security model.
a.
PSK
c.
MAC
b.
WEP
d.
TKIP
 

 18. 

When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.
a.
ciphertext
c.
plaintext
b.
detext
d.
deciphertext
 

 19. 

RC4 is a ____ cipher that accepts keys up to 128 bits in length.
a.
stream
c.
cyclic
b.
key
d.
logical
 

 20. 

What authentication system did the proposed WEP2 standard use?
a.
key caching
c.
AES-CCMP
b.
Kerberos
d.
dynamic WEP
 

 21. 

Which type of attacker typically has a high skill level?
a.
spy
c.
cracker
b.
hacker
d.
All of the above
 

 22. 

On wireless networks, ____ attacks are commonly done by attackers setting up a “fake” access point.
a.
spoof
c.
man-in-the-middle
b.
weak key
d.
DoS
 

 23. 

____ ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.
a.
Access control
c.
Integrity
b.
Availability
d.
Confidentiality
 

 24. 

According to the IEEE 802.11 cryptography objectives, how strong should WEP be?
a.
reasonably
c.
difficult
b.
extremely
d.
unbreakable
 

 25. 

The ____ wireless security standard provides a low level of security.
a.
WEP2
c.
WEP
b.
Dynamic WEP
d.
All of the above
 

 26. 

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
a.
security
c.
cost
b.
speed
d.
complexity
 

 27. 

Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.
a.
13
c.
17
b.
15
d.
19
 

 28. 

What is the first step in implementing an interim security model?
a.
port security
c.
MAC address filtering
b.
turning off SSID beaconing
d.
shared key authentication
 

 29. 

A ____ VPN is a user-to-LAN connection used by remote users.
a.
site-to-site
c.
peer-to-peer
b.
remote-to-LAN
d.
remote-access
 

 30. 

At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special “scan” mode, monitor the airwaves to detect signals from rogue access points.
a.
firewalls
c.
VPNs
b.
captive portals
d.
wireless sensors
 

 31. 

____ authentication is used in the enterprise security model using WPA and WPA2.
a.
TKIP
c.
AES
b.
IEEE 802.1x
d.
All of the above
 

 32. 

Which characteristic of information is guarded by access control?
a.
confidentiality
c.
availability
b.
robustness
d.
integrity
 

 33. 

The personal security model is intended for settings in which a(n) ____ is unavailable.
a.
AP
c.
intermediate security model
b.
wired network
d.
authentication server
 

 34. 

In a 64-bit packet sent using WEP, how many bits are actually encrypted?
a.
10
c.
40
b.
24
d.
64
 

 35. 

A standard personal computer can easily create over ____ possible password combinations per second.
a.
100
c.
1,000,000
b.
1,000
d.
1,000,000,000
 

 36. 

What security technology was most recently introduced?
a.
WPA2
c.
WEP2
b.
Dynamic WEP
d.
WPA
 

 37. 

When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters.  This provides the most secure option.
a.
ciphered
c.
hexadecimal
b.
ASCII
d.
plaintext
 

 38. 

MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.
a.
spoof
c.
break
b.
modify
d.
disable
 

 39. 

____ is considered to be the “heart and soul” of WPA security.
a.
IV
c.
TKIP
b.
MIC
d.
PSK
 

 40. 

The 802.11i standard addresses both ____.
a.
authentication and direction
c.
integrity and confidentiality
b.
encryption and confidentiality
d.
encryption and authentication
 

 41. 

What is the name of the 128-bit key used in TKIP?
a.
PRNG
c.
XOR
b.
temporal key
d.
MIC
 

 42. 

In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.
a.
unicast
c.
ticket
b.
broadcast
d.
passphrase
 

 43. 

In WEP, the CRC generates a(n) ____ based on the contents of the text.
a.
key
c.
checksum
b.
initialization vector
d.
cipher
 

 44. 

Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.
a.
port blocking
c.
port security
b.
port scanning
d.
an access control list
 

 45. 

Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.
a.
AES
c.
PSK
b.
TKIP
d.
CBC
 

 46. 

How long is the per-packet key used in TKIP?
a.
40-bits
c.
128-bits
b.
64-bits
d.
256-bits
 

 47. 

____ replaces CRC in WPA.
a.
MIC
c.
CMR
b.
CMC
d.
MRC
 

 48. 

A ____ attack on WEP involves viewing collisions to derive plaintext values.
a.
keystream
c.
weak key
b.
capture
d.
pseudo-random number
 

 49. 

Which aspect of information security does WEP protect?
a.
integrity
c.
availability
b.
confidentiality
d.
All of the above
 

 50. 

A WEP key can be a passphrase created by entering ____ ASCII characters.
a.
3
c.
10
b.
7
d.
16
 

 51. 

A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.
a.
disassociation
c.
incomplete
b.
drop
d.
misaddressed
 

 52. 

In a brute force attack, what key combination would follow 00001?
a.
00000
c.
00010
b.
00002
d.
10000
 

Matching
 
 
Match each term with the correct statement below.
a.
pre-shared key authentication
f.
supplicant
b.
dynamic WEP
g.
key caching
c.
AES-CCMP
h.
broadcast
d.
Advanced Encryption Standard
i.
Message Integrity Check
e.
802.11i
 

 53. 

performs three steps on every block (128 bits) of plaintext
 

 54. 

encryption protocol in the 802.11i standard
 

 55. 

wireless device that requires secure network access
 

 56. 

traffic sent to all users on the network
 

 57. 

solves the weak IV problem by rotating the keys frequently
 

 58. 

designed to prevent an attacker from capturing, altering, and resending data packets
 

 59. 

uses a passphrase that is manually entered to generate the encryption key
 

 60. 

robust security network
 

 61. 

stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
 
 
Match each term with the correct statement below.
a.
cipher
f.
computer spy
b.
keystream
g.
hacker
c.
cracker
h.
filter
d.
default key
i.
jam
e.
script kiddies
 

 62. 

person who violates system security with malicious intent
 

 63. 

key value that is used to encrypt wireless data transmissions when they are sent
 

 64. 

series of 1’s and 0’s equal in length to the text plus the ICV
 

 65. 

encryption algorithm
 

 66. 

person who has been hired to break into a computer and steal information
 

 67. 

person who uses his or her advanced computer skills to attack computers but not with a malicious intent
 

 68. 

attacker floods the radio frequency spectrum with noise
 

 69. 

limit a user’s admission to the access point
 

 70. 

unskilled or novice users who break into computer systems with malicious intent
 



 
         Start Over