Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup

Transcript
D. Ulf's network will not be safe until he also enables WEP.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 768
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
A.
B.
C.
D.
There is no mutual authentication between wireless clients and access points
Automated tools like AirSnort are available to discover WEP keys
The standard does not provide for centralized key management
The 24 bit Initialization Vector (IV) field is too small
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation: The lack of centralized key management in itself is not a reason that the WEP encryption is
vulnerable,it is the people setting the user shared key that makes it unsecure.
QUESTION 769
Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)
A.
B.
C.
D.
Identifies the wireless network
Acts as a password for network access
Should be left at the factory default setting
Not broadcasting the SSID defeats NetStumbler and other wireless discovery tools
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 770
Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)
A.
B.
C.
D.
E.
802.11b
802.11e
802.11a
802.11g
802.11
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation: