Deck 1: Foundations of Wireless Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 1: Foundations of Wireless Security
1
IEEE ____ standards set specifications for Ethernet local area network technology.
A) 802.3
B) 802.5
C) 802.11
D) 802.20
A) 802.3
B) 802.5
C) 802.11
D) 802.20
A
2
Individuals who actively search for wireless signals to pick up, often by simply driving down the street, are participating in an activity known as ____.
A) AP war
B) wireless war
C) access driving
D) wardriving
A) AP war
B) wireless war
C) access driving
D) wardriving
D
3
____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.
A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
D
4
Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.
A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.
A) flat
B) mesh
C) single
D) linked
A) flat
B) mesh
C) single
D) linked
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ site provides office space but the customer must provide and install all the equipment needed to continue operations.
A) cold
B) hot
C) warm
D) red
A) cold
B) hot
C) warm
D) red
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The primary advantage of wireless technology is ____.
A) easier and less expensive installation
B) mobility
C) security
D) disaster recovery
A) easier and less expensive installation
B) mobility
C) security
D) disaster recovery
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The FDA serves as the primary regulatory agency for wireless communications in the United States and its territorial possessions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.
A) mobility
B) network reliability
C) installation costs
D) security
A) mobility
B) network reliability
C) installation costs
D) security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is software (or sometimes hardware) that allows to view the contents of wireless packets.
A) Spyware
B) Malware
C) Wireless packet sniffer
D) Adware
A) Spyware
B) Malware
C) Wireless packet sniffer
D) Adware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Educational institutions were some of the first adopters of WLANs because of their dramatic advantages in teaching and learning.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.
A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ establishes standards for telecommunications.
A) FDA
B) IEEE
C) PDA
D) VoIP
A) FDA
B) IEEE
C) PDA
D) VoIP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
An employee who purchases a wireless access point and brings it into the office to provide personal wireless access has installed a ____.
A) wardriving point
B) rogue access point
C) VoWLAN handset
D) VoIP handset
A) wardriving point
B) rogue access point
C) VoWLAN handset
D) VoIP handset
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
In October 2002, the WECA organization changed its name to ____.
A) Wi-Fi (Wireless Fidelity) Alliance
B) WiMAX
C) VoWLAN
D) Project 802
A) Wi-Fi (Wireless Fidelity) Alliance
B) WiMAX
C) VoWLAN
D) Project 802
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Typically all rogue access points have security features implemented.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Wireless LAN applications can be found in every industry whose employees need or want to conduct business without being confined to a specific location.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In the United States, the organization that controls and regulates wireless transmissions for use by citizens (as opposed to the federal government) is the ____.
A) IEEE
B) Wi-Fi Alliance
C) FCC
D) FDA
A) IEEE
B) Wi-Fi Alliance
C) FCC
D) FDA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Security attacks are isolated against organizations.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures.
A) Information security
B) VoWLAN
C) FCC
D) FDA
A) Information security
B) VoWLAN
C) FCC
D) FDA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ uses the existing data WLAN to make and receive telephone calls.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Briefly explain how wireless technology increases network reliability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the benefits to businesses provided by wireless LANs?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
How does radio frequency interference affect wireless networks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Briefly describe the main characteristics of the IEEE.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are some of the characteristics of information that must be protected by information security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
For computer networking and wireless communications the most widely known and influential organization is the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ is the entire range of all radio frequencies.
A) unregulated bands
B) license-exempt spectrum
C) infrared light
D) radio frequency spectrum
A) unregulated bands
B) license-exempt spectrum
C) infrared light
D) radio frequency spectrum
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.
A) CDMA
B) ISM
C) UNII
D) GSM
A) CDMA
B) ISM
C) UNII
D) GSM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.
A) 802.1
B) 802.3
C) 802.8
D) 802.11
A) 802.1
B) 802.3
C) 802.8
D) 802.11
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ____________________ site has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
How does the speed of attacks factor make security increasingly difficult?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.
A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The 802.11g standard, which is backward-compatible with 802.11b, specifies that devices operate entirely in the ____ frequency.
A) UNII
B) GSM
C) CDMA
D) ISM
A) UNII
B) GSM
C) CDMA
D) ISM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The radio frequency spectrum is divided into over 450 different sections or ____.
A) bands
B) amplitudes
C) wavelengths
D) heights
A) bands
B) amplitudes
C) wavelengths
D) heights
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly explain how wireless technology benefits the health care industry.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe WECA main goals.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the six certifications within CWNP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the main characteristics of the IEEE 802.11b standard?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck