security+guide chp6

Upload: alex-jacobs

Post on 10-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Security+Guide Chp6

    1/5

    Review Questions

    1.The amendment to add 5.5 Mbps and 11 Mbps to the IEEE 802.11 standard is ______.

    A.IEEE 802.11a

    B.IEEE 802.11b

    C.IEEE 802.11g

    D.IEEE 802.11n

    2.Access to the wireless network can be restricted by _______.

    A.MAC address filtering

    B.ARP resolution

    C.TKIP encryption

    D.WEP authentication

    3.The cyclic redundancy check (CRC) is also called the _______.

    A.integrity check value (ICV)

    B.initialized vector resource (IVR)

    C.check parity bit (CPB)

    D.R5C check

    4.A wireless network requires that the _____ be authenticated first.

    A.user

    B.thick wireless device

    C.wireless device

    D.authentication probe

    5.The Service Set Identifier (SSID) _____.

    A.serves as the network name for a WLAN

  • 8/8/2019 Security+Guide Chp6

    2/5

  • 8/8/2019 Security+Guide Chp6

    3/5

    D.Wi-Fi Protected Access 2 (WPA2)

    10.The _____ replaces the cyclic redundancy check (CRC) and is designed to prevent anattacker from capturing, altering, and resending a data packet.

    A.Message Integrity Check (MIC)

    B.Cyclic Redundancy Check 2 (CRC2)

    C.Wi-Fi CRC

    D.Wireless Parity Check (WPC)

    11.The IEEE standard for wireless security is known as _____ .

    A.IEEE 803.x

    B.IEEE Wi-Fi Protected Access

    C.IEEE 802.11i

    D.IEEE PSK

    12.A(n) _____ is designed to verify the authentication of wireless devices using IEEE802.1x.

    A.proxy ID server

    B.access point server

    C.check point server

    D.authentication server

    13.Wireless switches are used in conjunction with _____ for increased security by

    moving security features to the switch.

    A.authentication access points (AAPs)

    B.network intrusion prevention system (NIPS)

    C.access control appliances (ACA)

    D.thin access points

  • 8/8/2019 Security+Guide Chp6

    4/5

    14.Separate _____ can be used to support low-security guest Internet access and high-security administrators on the same access point.

    A.wireless virtual local area networks (VLANs)

    B.segmented access points

    C.separated wireless streams (SWS)

    D.proxy security servers

    15.Each of the following can be used to monitor airwaves for traffic except a(n) _____.

    A.dedicated probe

    B.access point probe

    C.resource monitor probe

    D.wireless device probe

    16.A WEP key that is 128 bits in length _____ .

    A.has an initialization vector (IV) that is the same length as a WEP key of 64

    bits

    B.is less secure than a WEP key of 64 bits because shorter keys are better

    C.cannot be cracked because it is too long

    D.cannot be used on access points that use passphrases

    17.For a SOHO the best security model would be the _____

    A.Wi-Fi Protected Access Personal Security model

    B.Enterprise Protection Personal Security model

    C.IEEE Wi-Fi Personal Protection model

    D.Wi-Fi Protected Access 2 Personal Security model

    18.Preshared key (PSK) authentication requires that the encryption key _____.

    A.must be entered on all devices prior to wireless communication occurring

  • 8/8/2019 Security+Guide Chp6

    5/5

    B.be the same length as the Initialization Vector (IV)

    C.be entered in hexadecimal notation on the access point

    D.be encrypted before it can be entered by a user on a wireless device

    19._____ stores information from a device on the network so if a user roams away from a

    wireless access point and later returns, he does not need to re-enter all of thecredentials.

    A.Key-caching

    B.Pre-key authentication

    C.Key roaming

    D.Security key resolution

    20.The _____ model is designed for medium to large-size organizations in which anauthentication server is available.

    A.IEEE 802.11d

    B.Wi-Fi Academic

    C.WPA 2 Enterprise Security

    D.Wi-Fi 802.x