Professional Documents
Culture Documents
Review Questions
A. Confidentiality
B. Availability
C. Integrity
D. Authorization
A. products
B. people
C. communication
D. procedures
A. It makes it appear that the wireless device and the network computers are
communicating with each other.
A. RF jamming
D. SSID hiding
7. Which of the following is not a wireless LAN attack faced by a home user?
A. Steal data.
D. Inject malware.
B. laptop computer
C. antennas
D. wired NIC
A. authorizing devices
B. authorizing users
10. Each of the following is a name for the Media Access Control (MAC) address
except
A. physical address
B. logical address
C. hardware address
D. Ethernet address
11. WEP stands for
A. Plaintext
B. Cleartext
C. Opentext
D. Ciphertext
A. algorithm
B. key
C. link
D. cipher-log
A. 8 bits
B. 16 bits
C. 32 bits
D. 64 bits
16. The _____ is a 24-bit value used in WEP that changes each time a packet is
encrypted.
A. CRC
B. PRNG
C. IV
D. WPE
A. It may prevent users from being able to freely roam one AP coverage area to
another.
C. The SSID can be discovered in other management frames sent by the AP.
CWNA 3e, Chapter 9 Solutions
Page 4
© Cengage Learning 2013
D. It requires the WEP key to be changed.
B. Performing an XOR on two WEP keys will equal an XOR on two IVs.
C. Performing an XOR on two plaintext keys will equal an XOR on WEP keys.
D. Performing an XOR on all plaintext keys will equal an XOR on the two most
significant WEP keys.