Question 6 of 50WEP is a component of the IEEE 802.11 WLAN standards. Its primary purpose is to provide for the confidentiality of data on wireless networks at a level equivalent to that of the wired LANs. In a wireless LAN, the network can be accessed without physically connecting to the LAN. On what layer of the OSI model, WEP utilizes an encryption mechanism for minimizing unauthorized access on the WLAN?
Correct Answer: B
Question 7 of 50A DoS attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. At the data link layer, DoS attacks can be done easily. DoS attacks at the application and transport layers are primarily the same, but the interaction between the network, data-link, and physical layers which increase the risk of a DoS attack on a wireless network is different. An attacker can create a device that will saturate the 802.11 frequency bands with noise. If the attacker can create enough RF noise to reduce the signal-to-noise ratio to an unusable level, then the devices within the range of the noise will be effectively taken offline to block the communication. What type of DoS attack is being discussed here?
Correct Answer: C
Question 8 of 50Which of the following is an intentional act of sending multiple copies of the identical content to the same recipient?
Correct Answer: C
Question 9 of 50Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.
Correct Answer: C
Question 10 of 50Firewall protection is provided by different types of firewalls. One of the firewall types works at the session layer of the OSI model, or the TCP layer of TCP/IP, and monitors TCP handshaking between packets to determine whether a requested session is legitimate. This level hides information about the private networks they protect, but they do not filter individual packets. Identify the type of firewall described above.