8 Deauthentication Terminates an existing authentication 9 Privacy Prevents

8 deauthentication terminates an existing

This preview shows page 47 - 50 out of 70 pages.

6.5 How is the concept of an association related to that of mobility? American College of Commerce & Technology Page 47
Image of page 47
(Advanced Network Security) Security in computing Jay Patel CHAPTER 7: WIRELESS NETWORK SECURITYTRUE OR FALSE 1. IEEE 802.11 is a standard for wireless LANs. 2. Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks. TF 3. Sensors and robots, are not vulnerable to physical attacks. 4. The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN. 5. MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges. 6. The DS can be a switch, a wired network, or a wireless network. TF 7. The pairwise master key is derived from the group key. 8. IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs. 9. Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing. 10. The actual method of key generation depends on the details of the authentication protocol used. TF 11. The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors. The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption. American College of Commerce & Technology Page 48
Image of page 48
(Advanced Network Security) Security in computing Jay Patel T F 13. The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. 14. You should allow only specific computers to access your wireless network. 15. Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party. MULTIPLE CHOICE
Image of page 49
Image of page 50

You've reached the end of your free preview.

Want to read all 70 pages?

  • Fall '16
  • Oscar Ayer
  • Cryptography, Public-key cryptography, Pretty Good Privacy, Cryptographic hash function, Block cipher

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture