Deck 7: Wireless Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
Play
Full screen (f)
Deck 7: Wireless Network Security
1
QPSK uses four signal states that are ____ degrees out of phase to carry four signal values.
A) 30
C) 90
B) 60
D) 180
A) 30
C) 90
B) 60
D) 180
C
2
Which group was created to certify the interoperability of 802.11b products?
A) IEEE
C) ITU
B) Wi-Fi Alliance
D) ANSI
A) IEEE
C) ITU
B) Wi-Fi Alliance
D) ANSI
B
3
Which technology works by taking the original data stream and breaking it up into small bits, then transmitting each of those on a different frequency channel simultaneously?
A) Direct-Sequence Spread Spectrum (DSSS)
B) Frequency Hopping Spread Spectrum (FHSS)
C) Orthogonal frequency-division multiplexing (OFDM)
D) Quadrature Phase Shift Keying (QPSK)
A) Direct-Sequence Spread Spectrum (DSSS)
B) Frequency Hopping Spread Spectrum (FHSS)
C) Orthogonal frequency-division multiplexing (OFDM)
D) Quadrature Phase Shift Keying (QPSK)
D
4
Which connectivity model uses a single access point that provides connectivity for a number of clients within a BSS?
A) Point-to-point
C) Mesh multipoint
B) Point-to-multipoint
D) Roaming
A) Point-to-point
C) Mesh multipoint
B) Point-to-multipoint
D) Roaming
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
Which wireless modulation technique combines digital and analog signaling to encode data into radio signals?
A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
What is the branding name for interoperable equipment that is capable of supporting IEEE 802.11i requirements?
A) Wi-Fi
C) WPA2
B) WAP
D) WPA
A) Wi-Fi
C) WPA2
B) WAP
D) WPA
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
EAP is an actual authentication mechanism.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
Which wireless modulation technique addresses the transmission of the data stream that has been properly encoded onto the radio signal?
A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ of the wireless network is the area the radio signal reaches.
A) basic service area
C) footprint
B) usage pattern
D) spectrum
A) basic service area
C) footprint
B) usage pattern
D) spectrum
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
The primary drawback associated with ad hoc networks is that they are inherently ____.
A) complex
C) an older technology
B) expensive
D) unreliable
A) complex
C) an older technology
B) expensive
D) unreliable
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
What is the largest area of concern with regard to security in ZigBee?
A) Weak encryption method
C) ARP poisoning
B) Rogue access points
D) Accidental key reuse
A) Weak encryption method
C) ARP poisoning
B) Rogue access points
D) Accidental key reuse
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
Ad hoc wireless models rely on the existence of ____ to provide connectivity.
A) tunnels
C) multiple stations
B) keys
D) formal access points
A) tunnels
C) multiple stations
B) keys
D) formal access points
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
The primary advantage of the ____ wireless topology configuration is the flexibility of the network.
A) hierarchal
C) star
B) hybrid
D) mesh
A) hierarchal
C) star
B) hybrid
D) mesh
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
A collection of BSSs connected by one or more DSs is referred to as an ____ service set (ESS).
A) electric
C) elaborate
B) extended
D) eccentric
A) electric
C) elaborate
B) extended
D) eccentric
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
In the mesh wireless topology, there may be no dominant ____.
A) WAP
C) amplitude
B) key
D) encryption method
A) WAP
C) amplitude
B) key
D) encryption method
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
Most BSS networks are configured as simple stars.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
Most installed wireless networks use the infrastructure model.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
A BSSID of all zeros is used as a broadcast address for all nodes on the BSS.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
The primary advantage of the ____ wireless topology configuration is the increased number of connections among stations, which allows greater connectivity.
A) hierarchal
C) star
B) hybrid
D) mesh
A) hierarchal
C) star
B) hybrid
D) mesh
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
By default, Bluetooth authenticates connections.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A "wrapper"used to enhance the WEP protocol.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A "wrapper"used to enhance the WEP protocol.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
The use of ____ is required to achieve RSN compliance.
A) WPA2
C) TKIP
B) CCMP
D) EAP
A) WPA2
C) TKIP
B) CCMP
D) EAP
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
A mobile ____________________ is a service usually provided by a wireless telephony service provider to allow users to connect their wireless devices to a specific commercial wireless service.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
The improved Bluetooth 2.0 increased the data rate to around ____ Mbps.
A) three
C) five
B) four
D) six
A) three
C) five
B) four
D) six
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
The basic model of wireless clients within a defined network area is referred to as the ____________________ (BSS).
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is the latest roaming implementation for wide-scale wireless networking.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A standard for devices in facilities that are geographically dispersed.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A standard for devices in facilities that are geographically dispersed.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The first standard for ultra-wideband radio technology.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The first standard for ultra-wideband radio technology.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A wireless protocol created by CISCO for its devices in order to provide an additional security layer to networks using WEP.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A wireless protocol created by CISCO for its devices in order to provide an additional security layer to networks using WEP.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
Which notable Bluetooth attack allows a nearby attacker to issue commands to an unsuspecting target phone?
A) Bluesnarf
C) BlueBug
B) Bluejacking
D) Evil twin
A) Bluesnarf
C) BlueBug
B) Bluejacking
D) Evil twin
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Bluetooth networks are referred to as ____.
A) piconets
C) honeynets
B) econets
D) ultra-wideband networks
A) piconets
C) honeynets
B) econets
D) ultra-wideband networks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Which wireless security protocol is considered to be too weak for use inmost network settings?
A) WAP
C) WPA2
B) WPA
D) WEP
A) WAP
C) WPA2
B) WPA
D) WEP
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A WPAN standard used for monitoring and control devices.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A WPAN standard used for monitoring and control devices.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The branding label for a wireless local area network (WLAN).
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The branding label for a wireless local area network (WLAN).
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A security protocol created by the Wi-Fi Alliance that called for supporting the Advanced Encryption Standard (AES).
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A security protocol created by the Wi-Fi Alliance that called for supporting the Advanced Encryption Standard (AES).
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____________________ is a network that only allows connections that are Robust Security Network Associations (RSNAs) - in other words, wireless connections that provide encryption to protect against WLAN security threats.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
The term ____________________ refers to the practice of driving around looking for and mapping insecure WLANs.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
List four differences between wireless networks and networks that use physical media like wires or cables.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The radio transmitter/receiver that takes the signal from the wired network and broadcasts it to wireless receivers, and vice versa.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The radio transmitter/receiver that takes the signal from the wired network and broadcasts it to wireless receivers, and vice versa.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
An open standard for short-range wireless communications between computers and small computing devices, including cell phones, earpieces, and computer accessories.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
An open standard for short-range wireless communications between computers and small computing devices, including cell phones, earpieces, and computer accessories.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
How does TKIP provide encapsulation?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the basic building block of a wireless network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Describe the hybrid wireless topology.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
Why is SSID hiding considered to be a security myth?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
How did the Wi-Fi Alliance resolve the issues with WEP?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
Describe the point-to-point wireless network model.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Describe two key benefits of Bluetooth technology.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
List three recommendations to help secure a wireless network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
What are the two general principles to keep in mind when securing Bluetooth-enabled devices?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck