

![]()


This course explores the principles and practices of cryptographic techniques specifically tailored for wireless network environments. Students will examine modern encryption algorithms, key management protocols, and authentication mechanisms that address the unique security challenges posed by wireless communication, such as eavesdropping, spoofing, and denial-of-service attacks. Emphasis is placed on the practical application of cryptographic solutions in wireless protocols like Wi-Fi and mobile networks, as well as the design of secure systems for emerging wireless technologies. By the end of the course, students will be equipped to evaluate, implement, and enhance cryptographic protections in real-world wireless network scenarios.
Recommended Textbook
CWSP Guide to Wireless Security 1st Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1118 Page 2

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21967
Sample Questions
Q1) A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Answer: zero day
Q2) Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.
A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
Answer: C
Q3) The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.
A) 802.1
B) 802.3
C) 802.8
D) 802.11
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
3

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21968
Sample Questions
Q1) A(n) ____________________ acts as the central base station for the wireless network.
Answer: access point (AP) access point
AP
Q2) Deploying dynamic WEP is a very expensive solution that involves a lot of effort.
A)True
B)False
Answer: False
Q3) At regular intervals (normally every 100 ms) an AP sends a(n) ____ to announce its presence and to provide the necessary information for other devices that want to join the network.
A) association request frame
B) CRC
C) ICV
D) beacon frame
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21969
Sample Questions
Q1) Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.
A) warchalking
B) phishing
C) pharming
D) dumpster diving
Answer: A
Q2) The smallest mobile computing device is a(n) ____________________.
Answer: personal digital assistant (PDA)
personal digital assistant
PDA
Q3) ____ is a version of NetStumbler that runs on handheld devices.
A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
Answer: B
Q4) ____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.
Answer: Google phishing
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21970
Sample Questions
Q1) A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
Q2) Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.
A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
Q3) ____ is a service that allows devices on a network to discover other devices and determine how to work with them.
A) IPSec
B) SNMP
C) UPnP
D) PnP
Q4) What are some of the symptoms that indicate a virus has infected a computer?
Q5) What are some of the characteristics of weak passwords?
Q6) With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21971
Sample Questions
Q1) WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.
Q2) What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
Q3) The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.
A) supplicant
B) authenticator
C) authentication server
D) RADIUS
Q4) The ____ model is used as a "bridge" solution in situations where WPA or WPA2 security is not available.
A) personal security
B) enterprise security
C) SOHO security
D) transitional security
Q5) What are the steps involved in the 802.1x authentication procedure?
Q6) WPA replaces WEP with an encryption technology called ____________________.
Q7) What are the TKIP major components?
Q8) What are some of the PSK key management weaknesses?
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21972
Sample Questions
Q1) A highly directional antenna focuses the energy in one direction but does not have the high power level of a semi-directional antenna.
A)True
B)False
Q2) A(n) ____ switch supports both control and monitoring of the network.
A) unmanaged
B) managed
C) free
D) wireless
Q3) In the ____ access control, the user can adjust the permissions for other users over network devices.
A) mandatory
B) discretionary
C) role based
D) temporal
Q4) What are the three basic types of filtering?
Q5) What are some of the advantages and disadvantages of ad hoc wireless mesh networks?
Q6) What are some of the features of the IEEE 802.11v protocol?
Q7) Describe the main characteristics of transmit power control (TPC).
To view all questions and flashcards with answers, click on the resource link above. Page 8
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21973
Sample Questions
Q1) One standard for marking VLAN packets is the IEEE ____ standard.
A) 802.1q
B) 802.1r
C) 802.1v
D) 802.1z
Q2) Why is diversity necessary to provide better security?
Q3) A firewall is sometimes called a ____.
A) bridge
B) hub
C) packet filter
D) repeater
Q4) A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.
Q5) What is security by obscurity?
Q6) The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.
A) CRC files
B) definition files
C) TPID files
D) infection files

Page 9
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21974
Sample Questions
Q1) Identify the types of information typically included in a digital certificate.
Q2) ____ uses the unique human characteristics of a person for authentication (something the user is).
A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
Q3) What are the primary differences between LDAP and DAP?
Q4) LDAP was developed by Microsoft and the University of Michigan in 1996.
A)True
B)False
Q5) The ____ is used by the EAP key exchanges to provide confidentiality.
A) KEK
B) KCK
C) WPAK
D) nonce key
Q6) EAP was originally defined for dial-up access but is now used for both wired and wireless access.
A)True
B)False

Page 10
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21975
Sample Questions
Q1) How does SCP work?
Q2) What are the areas of protection provided by IPsec?
Q3) The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
Q4) SSH can even be used as a tool for secure network backups.
A)True
B)False
Q5) A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
Q6) An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.
A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
Q7) ____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).
Q8) Briefly describe how SNMP works.

Page 11
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21976
Sample Questions
Q1) A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.
A) AP trap
B) CDP trap
C) WLAN trap
D) SNMP trap
Q2) A more proactive approach than intrusion detection is a(n) ____.
A) RF fingerprinting
B) trilateration system
C) RSSI system
D) intrusion prevention system (IPS)
Q3) ____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
Q4) All wireless network interface card adapters can act as a wireless device probe.
A)True
B)False
Q5) What are the steps to perform a mobile sniffing audit?
Q6) What is the key to wireless probes?

12
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21977
Sample Questions
Q1) What are the layers of information security?
Q2) Identifying assets is a fairly simple and quick process.
A)True
B)False
Q3) A ____ is a collection of suggestions that should be implemented.
A) code of ethics
B) guideline
C) standard
D) policy
Q4) A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.
A) threat modeling
B) risk assessment
C) attack tree
D) attack modeling
Q5) A(n) ____ outlines the actions to be performed when a security breach occurs.
A) risk identification
B) threat modeling
C) risk management
D) incident response

Page 13
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21978
Sample Questions
Q1) Briefly describe traffic filtering.
Q2) Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.
A) pedagogical
B) neurological
C) visual
D) kinesthetic
Q3) Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
Q4) ____, or controlling changes made to the WLAN after installation, is another key element of operational support.
A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
Q5) All computer users share responsibility for protecting the assets of an organization.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14