security+guide chp6
TRANSCRIPT
-
8/8/2019 Security+Guide Chp6
1/5
Review Questions
1.The amendment to add 5.5 Mbps and 11 Mbps to the IEEE 802.11 standard is ______.
A.IEEE 802.11a
B.IEEE 802.11b
C.IEEE 802.11g
D.IEEE 802.11n
2.Access to the wireless network can be restricted by _______.
A.MAC address filtering
B.ARP resolution
C.TKIP encryption
D.WEP authentication
3.The cyclic redundancy check (CRC) is also called the _______.
A.integrity check value (ICV)
B.initialized vector resource (IVR)
C.check parity bit (CPB)
D.R5C check
4.A wireless network requires that the _____ be authenticated first.
A.user
B.thick wireless device
C.wireless device
D.authentication probe
5.The Service Set Identifier (SSID) _____.
A.serves as the network name for a WLAN
-
8/8/2019 Security+Guide Chp6
2/5
-
8/8/2019 Security+Guide Chp6
3/5
D.Wi-Fi Protected Access 2 (WPA2)
10.The _____ replaces the cyclic redundancy check (CRC) and is designed to prevent anattacker from capturing, altering, and resending a data packet.
A.Message Integrity Check (MIC)
B.Cyclic Redundancy Check 2 (CRC2)
C.Wi-Fi CRC
D.Wireless Parity Check (WPC)
11.The IEEE standard for wireless security is known as _____ .
A.IEEE 803.x
B.IEEE Wi-Fi Protected Access
C.IEEE 802.11i
D.IEEE PSK
12.A(n) _____ is designed to verify the authentication of wireless devices using IEEE802.1x.
A.proxy ID server
B.access point server
C.check point server
D.authentication server
13.Wireless switches are used in conjunction with _____ for increased security by
moving security features to the switch.
A.authentication access points (AAPs)
B.network intrusion prevention system (NIPS)
C.access control appliances (ACA)
D.thin access points
-
8/8/2019 Security+Guide Chp6
4/5
14.Separate _____ can be used to support low-security guest Internet access and high-security administrators on the same access point.
A.wireless virtual local area networks (VLANs)
B.segmented access points
C.separated wireless streams (SWS)
D.proxy security servers
15.Each of the following can be used to monitor airwaves for traffic except a(n) _____.
A.dedicated probe
B.access point probe
C.resource monitor probe
D.wireless device probe
16.A WEP key that is 128 bits in length _____ .
A.has an initialization vector (IV) that is the same length as a WEP key of 64
bits
B.is less secure than a WEP key of 64 bits because shorter keys are better
C.cannot be cracked because it is too long
D.cannot be used on access points that use passphrases
17.For a SOHO the best security model would be the _____
A.Wi-Fi Protected Access Personal Security model
B.Enterprise Protection Personal Security model
C.IEEE Wi-Fi Personal Protection model
D.Wi-Fi Protected Access 2 Personal Security model
18.Preshared key (PSK) authentication requires that the encryption key _____.
A.must be entered on all devices prior to wireless communication occurring
-
8/8/2019 Security+Guide Chp6
5/5
B.be the same length as the Initialization Vector (IV)
C.be entered in hexadecimal notation on the access point
D.be encrypted before it can be entered by a user on a wireless device
19._____ stores information from a device on the network so if a user roams away from a
wireless access point and later returns, he does not need to re-enter all of thecredentials.
A.Key-caching
B.Pre-key authentication
C.Key roaming
D.Security key resolution
20.The _____ model is designed for medium to large-size organizations in which anauthentication server is available.
A.IEEE 802.11d
B.Wi-Fi Academic
C.WPA 2 Enterprise Security
D.Wi-Fi 802.x