Deck 7: Wireless Network Security

Full screen (f)
exit full mode
Question
QPSK uses four signal states that are ____ degrees out of phase to carry four signal values.

A) 30
C) 90
B) 60
D) 180
Use Space or
up arrow
down arrow
to flip the card.
Question
Which group was created to certify the interoperability of 802.11b products?

A) IEEE
C) ITU
B) Wi-Fi Alliance
D) ANSI
Question
Which technology works by taking the original data stream and breaking it up into small bits, then transmitting each of those on a different frequency channel simultaneously?

A) Direct-Sequence Spread Spectrum (DSSS)
B) Frequency Hopping Spread Spectrum (FHSS)
C) Orthogonal frequency-division multiplexing (OFDM)
D) Quadrature Phase Shift Keying (QPSK)
Question
Which connectivity model uses a single access point that provides connectivity for a number of clients within a BSS?

A) Point-to-point
C) Mesh multipoint
B) Point-to-multipoint
D) Roaming
Question
Which wireless modulation technique combines digital and analog signaling to encode data into radio signals?

A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
Question
What is the branding name for interoperable equipment that is capable of supporting IEEE 802.11i requirements?

A) Wi-Fi
C) WPA2
B) WAP
D) WPA
Question
EAP is an actual authentication mechanism.
Question
Which wireless modulation technique addresses the transmission of the data stream that has been properly encoded onto the radio signal?

A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
Question
The ____ of the wireless network is the area the radio signal reaches.

A) basic service area
C) footprint
B) usage pattern
D) spectrum
Question
The primary drawback associated with ad hoc networks is that they are inherently ____.

A) complex
C) an older technology
B) expensive
D) unreliable
Question
What is the largest area of concern with regard to security in ZigBee?

A) Weak encryption method
C) ARP poisoning
B) Rogue access points
D) Accidental key reuse
Question
Ad hoc wireless models rely on the existence of ____ to provide connectivity.

A) tunnels
C) multiple stations
B) keys
D) formal access points
Question
The primary advantage of the ____ wireless topology configuration is the flexibility of the network.

A) hierarchal
C) star
B) hybrid
D) mesh
Question
A collection of BSSs connected by one or more DSs is referred to as an ____ service set (ESS).

A) electric
C) elaborate
B) extended
D) eccentric
Question
In the mesh wireless topology, there may be no dominant ____.

A) WAP
C) amplitude
B) key
D) encryption method
Question
Most BSS networks are configured as simple stars.
Question
Most installed wireless networks use the infrastructure model.
Question
A BSSID of all zeros is used as a broadcast address for all nodes on the BSS.
Question
The primary advantage of the ____ wireless topology configuration is the increased number of connections among stations, which allows greater connectivity.

A) hierarchal
C) star
B) hybrid
D) mesh
Question
By default, Bluetooth authenticates connections.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A "wrapper"used to enhance the WEP protocol.
Question
The use of ____ is required to achieve RSN compliance.

A) WPA2
C) TKIP
B) CCMP
D) EAP
Question
A mobile ____________________ is a service usually provided by a wireless telephony service provider to allow users to connect their wireless devices to a specific commercial wireless service.
Question
The improved Bluetooth 2.0 increased the data rate to around ____ Mbps.

A) three
C) five
B) four
D) six
Question
The basic model of wireless clients within a defined network area is referred to as the ____________________ (BSS).
Question
____________________ is the latest roaming implementation for wide-scale wireless networking.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A standard for devices in facilities that are geographically dispersed.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The first standard for ultra-wideband radio technology.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A wireless protocol created by CISCO for its devices in order to provide an additional security layer to networks using WEP.
Question
Which notable Bluetooth attack allows a nearby attacker to issue commands to an unsuspecting target phone?

A) Bluesnarf
C) BlueBug
B) Bluejacking
D) Evil twin
Question
Bluetooth networks are referred to as ____.

A) piconets
C) honeynets
B) econets
D) ultra-wideband networks
Question
Which wireless security protocol is considered to be too weak for use inmost network settings?

A) WAP
C) WPA2
B) WPA
D) WEP
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A WPAN standard used for monitoring and control devices.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The branding label for a wireless local area network (WLAN).
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A security protocol created by the Wi-Fi Alliance that called for supporting the Advanced Encryption Standard (AES).
Question
A(n) ____________________ is a network that only allows connections that are Robust Security Network Associations (RSNAs) - in other words, wireless connections that provide encryption to protect against WLAN security threats.
Question
The term ____________________ refers to the practice of driving around looking for and mapping insecure WLANs.
Question
List four differences between wireless networks and networks that use physical media like wires or cables.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The radio transmitter/receiver that takes the signal from the wired network and broadcasts it to wireless receivers, and vice versa.
Question
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
An open standard for short-range wireless communications between computers and small computing devices, including cell phones, earpieces, and computer accessories.
Question
How does TKIP provide encapsulation?
Question
Describe the basic building block of a wireless network.
Question
Describe the hybrid wireless topology.
Question
Why is SSID hiding considered to be a security myth?
Question
How did the Wi-Fi Alliance resolve the issues with WEP?
Question
Describe the point-to-point wireless network model.
Question
Describe two key benefits of Bluetooth technology.
Question
List three recommendations to help secure a wireless network.
Question
What are the two general principles to keep in mind when securing Bluetooth-enabled devices?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Wireless Network Security
1
QPSK uses four signal states that are ____ degrees out of phase to carry four signal values.

A) 30
C) 90
B) 60
D) 180
C
2
Which group was created to certify the interoperability of 802.11b products?

A) IEEE
C) ITU
B) Wi-Fi Alliance
D) ANSI
B
3
Which technology works by taking the original data stream and breaking it up into small bits, then transmitting each of those on a different frequency channel simultaneously?

A) Direct-Sequence Spread Spectrum (DSSS)
B) Frequency Hopping Spread Spectrum (FHSS)
C) Orthogonal frequency-division multiplexing (OFDM)
D) Quadrature Phase Shift Keying (QPSK)
D
4
Which connectivity model uses a single access point that provides connectivity for a number of clients within a BSS?

A) Point-to-point
C) Mesh multipoint
B) Point-to-multipoint
D) Roaming
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
Which wireless modulation technique combines digital and analog signaling to encode data into radio signals?

A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
What is the branding name for interoperable equipment that is capable of supporting IEEE 802.11i requirements?

A) Wi-Fi
C) WPA2
B) WAP
D) WPA
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
EAP is an actual authentication mechanism.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
Which wireless modulation technique addresses the transmission of the data stream that has been properly encoded onto the radio signal?

A) Spread-spectrum transmission
C) QPSK
B) QAM
D) BPSK
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ of the wireless network is the area the radio signal reaches.

A) basic service area
C) footprint
B) usage pattern
D) spectrum
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
The primary drawback associated with ad hoc networks is that they are inherently ____.

A) complex
C) an older technology
B) expensive
D) unreliable
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
What is the largest area of concern with regard to security in ZigBee?

A) Weak encryption method
C) ARP poisoning
B) Rogue access points
D) Accidental key reuse
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
Ad hoc wireless models rely on the existence of ____ to provide connectivity.

A) tunnels
C) multiple stations
B) keys
D) formal access points
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
The primary advantage of the ____ wireless topology configuration is the flexibility of the network.

A) hierarchal
C) star
B) hybrid
D) mesh
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
A collection of BSSs connected by one or more DSs is referred to as an ____ service set (ESS).

A) electric
C) elaborate
B) extended
D) eccentric
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
In the mesh wireless topology, there may be no dominant ____.

A) WAP
C) amplitude
B) key
D) encryption method
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
Most BSS networks are configured as simple stars.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
Most installed wireless networks use the infrastructure model.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
A BSSID of all zeros is used as a broadcast address for all nodes on the BSS.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
The primary advantage of the ____ wireless topology configuration is the increased number of connections among stations, which allows greater connectivity.

A) hierarchal
C) star
B) hybrid
D) mesh
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
By default, Bluetooth authenticates connections.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A "wrapper"used to enhance the WEP protocol.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
The use of ____ is required to achieve RSN compliance.

A) WPA2
C) TKIP
B) CCMP
D) EAP
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
A mobile ____________________ is a service usually provided by a wireless telephony service provider to allow users to connect their wireless devices to a specific commercial wireless service.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
The improved Bluetooth 2.0 increased the data rate to around ____ Mbps.

A) three
C) five
B) four
D) six
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
The basic model of wireless clients within a defined network area is referred to as the ____________________ (BSS).
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is the latest roaming implementation for wide-scale wireless networking.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A standard for devices in facilities that are geographically dispersed.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The first standard for ultra-wideband radio technology.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A wireless protocol created by CISCO for its devices in order to provide an additional security layer to networks using WEP.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
Which notable Bluetooth attack allows a nearby attacker to issue commands to an unsuspecting target phone?

A) Bluesnarf
C) BlueBug
B) Bluejacking
D) Evil twin
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Bluetooth networks are referred to as ____.

A) piconets
C) honeynets
B) econets
D) ultra-wideband networks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Which wireless security protocol is considered to be too weak for use inmost network settings?

A) WAP
C) WPA2
B) WPA
D) WEP
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A WPAN standard used for monitoring and control devices.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The branding label for a wireless local area network (WLAN).
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
A security protocol created by the Wi-Fi Alliance that called for supporting the Advanced Encryption Standard (AES).
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____________________ is a network that only allows connections that are Robust Security Network Associations (RSNAs) - in other words, wireless connections that provide encryption to protect against WLAN security threats.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
The term ____________________ refers to the practice of driving around looking for and mapping insecure WLANs.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
List four differences between wireless networks and networks that use physical media like wires or cables.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
The radio transmitter/receiver that takes the signal from the wired network and broadcasts it to wireless receivers, and vice versa.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.WPA
f.ZigBee
b.Bluetooth
g.WAP
c.WiMAX
h.TKIP
d.WiMedia
i.Wi-Fi
e.Leap authentication
An open standard for short-range wireless communications between computers and small computing devices, including cell phones, earpieces, and computer accessories.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
How does TKIP provide encapsulation?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the basic building block of a wireless network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Describe the hybrid wireless topology.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
Why is SSID hiding considered to be a security myth?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
How did the Wi-Fi Alliance resolve the issues with WEP?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
Describe the point-to-point wireless network model.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Describe two key benefits of Bluetooth technology.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
List three recommendations to help secure a wireless network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
What are the two general principles to keep in mind when securing Bluetooth-enabled devices?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.