6.5 How is the concept of an association related to that of mobility?
American College of Commerce & Technology
Page 47

(Advanced Network Security) Security in computing
Jay Patel
CHAPTER 7: WIRELESS NETWORK SECURITYTRUE OR FALSE
1. IEEE 802.11 is a standard for wireless LANs.
2. Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks.
TF
3. Sensors and robots, are not vulnerable to physical attacks.
4. The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
5. MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.
6. The DS can be a switch, a wired network, or a wireless network.
TF
7. The pairwise master key is derived from the group key.
8. IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.
9. Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.
10. The actual method of key generation depends on the details of the authentication protocol used.
TF
11. The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.
The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.
American College of Commerce & Technology
Page 48

(Advanced Network Security) Security in computing
Jay Patel
T
F
13. The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
14. You should allow only specific computers to access your wireless network.
15. Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
MULTIPLE CHOICE


You've reached the end of your free preview.
Want to read all 70 pages?
- Fall '16
- Oscar Ayer
- Cryptography, Public-key cryptography, Pretty Good Privacy, Cryptographic hash function, Block cipher