You are on page 1of 5

Solutions Chapter 9

Review Questions
1. Each of the following is a reason why it is difficult to defend against todays
attackers except _______.
A. complexity of attack tools
B. weak patch distribution
C. greater sophistication of attacks
D. delays in patching hardware and software products
2. _____ ensures that only authorized parties can view the information.
A. Confidentiality
B. Availability
C. Integrity
D. Authorization
3. Each of the following is a layer that protects security except
A. products
B. people
C. communication
D. procedures
4. Which of the following is true regarding a rogue AP?
A. It is an unauthorized AP installed by an employee.
B. It is a hardware-only device.
C. It requires SoftAP to function.
D. It cannot be used by attackers but only by internal employees.
CWNA 3e, Chapter 9 Solutions
Page 1
Cengage Learning 2013

5. Which of the following is false regarding a man-in-the-middle attack?


A. It makes it appear that the wireless device and the network computers are
communicating with each other.
B. As it receives data from the devices it passes it on to the recipient.
C. It can only be active.
D. It requires a rogue AP.
6. Which of the following is not a wireless DoS attack?
A. RF jamming
B. creating false deauthentication or disassociation frames
C. manipulating duration field values
D. SSID hiding
7. Which of the following is not a wireless LAN attack faced by a home user?
A. Steal data.
B. Upload harmful content.
C. Read wireless transmissions.
D. Inject malware.
8. Each of the following can be used in war driving except
A. global positioning system (GPS)
B. laptop computer
C. antennas
D. wired NIC
9. What is access control in a WLAN?
A. authorizing devices
B. authorizing users
CWNA 3e, Chapter 9 Solutions
Page 2
Cengage Learning 2013

C. restricting direct access to a Web server


D. requiring a user to enter a password on the AP
10. Each of the following is a name for the Media Access Control (MAC) address
except
A. physical address
B. logical address
C. hardware address
D. Ethernet address
11. WEP stands for
A. wired equivalent privacy
B. wireless equality protection
C. wardriving early protection
D. wave equilibrium penetration
12. What is data called that is to be encrypted by inputting into an encryption
algorithm?
A. Plaintext
B. Cleartext
C. Opentext
D. Ciphertext
13. A mathematical value used to produce ciphertext is called a(n)
A. algorithm
B. key
C. link
D. cipher-log
14. What is a weak key?
CWNA 3e, Chapter 9 Solutions
Page 3
Cengage Learning 2013

A. A key that creates a repeating pattern.


B. A key that is fewer than 12 characters in length.
C. An IV that is over 128 characters long.
D. A CRC that cannot be produced by a PRNG.
15. What is the minimum length for a WEP key?
A. 8 bits
B. 16 bits
C. 32 bits
D. 64 bits
16. The _____ is a 24-bit value used in WEP that changes each time a packet is
encrypted.
A. CRC
B. PRNG
C. IV
D. WPE
17. Which of authentication is a match of SSIDs?
A. Closed system authentication
B. Shared key authentication
C. Open system authentication
D. SSID matching authentication
18. Each of the following is a limitation of SSID hiding except
A. It may prevent users from being able to freely roam one AP coverage area to
another.
B. The SSID can be retrieved from an authenticated device.
C. The SSID can be discovered in other management frames sent by the AP.
CWNA 3e, Chapter 9 Solutions
Page 4
Cengage Learning 2013

D. It requires the WEP key to be changed.


19. Which of the following is not a limitation to MAC address filtering?
A. Managing keys for multiple devices can be difficult.
B. Not all client devices have MAC addresses.
C. MAC addresses are initially exchanged in cleartext.
D. MAC addresses can be spoofed or substituted.
20. What is the basis for a keystream attack?
A. Performing an XOR on two ciphertexts will equal an XOR on the two
plaintexts.
B. Performing an XOR on two WEP keys will equal an XOR on two IVs.
C. Performing an XOR on two plaintext keys will equal an XOR on WEP keys.
D. Performing an XOR on all plaintext keys will equal an XOR on the two most
significant WEP keys.

CWNA 3e, Chapter 9 Solutions


Page 5
Cengage Learning 2013

You might also like